An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. API requests can be used to inject, generate and download executable files to the client ("Reflected File Download"). Malicious platform specific (e.g. Microsoft Windows) batch file can be created via a trusted domain without authentication that, if executed by the user, may lead to local code execution.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93460 | Third Party Advisory VDB Entry |
https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/93460 | Third Party Advisory VDB Entry |
https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93460 - Third Party Advisory, VDB Entry | |
References | () https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3522_7.8.2_2016-08-29.pdf - Release Notes, Vendor Advisory |
Information
Published : 2016-12-15 06:59
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6848
Mitre link : CVE-2016-6848
CVE.ORG link : CVE-2016-6848
JSON object : View
Products Affected
open-xchange
- open-xchange_appsuite
CWE
CWE-254
7PK - Security Features