CVE-2021-38377

OX App Suite through 7.10.5 allows XSS via JavaScript code in an anchor HTML comment within truncated e-mail, because there is a predictable UUID with HTML transformation results.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:16

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html - Exploit, Third Party Advisory
References () https://seclists.org/fulldisclosure/2021/Nov/43 - Exploit, Mailing List, Third Party Advisory () https://seclists.org/fulldisclosure/2021/Nov/43 - Exploit, Mailing List, Third Party Advisory
References () https://www.open-xchange.com - Product () https://www.open-xchange.com - Product

Information

Published : 2021-11-22 09:15

Updated : 2024-11-21 06:16


NVD link : CVE-2021-38377

Mitre link : CVE-2021-38377

CVE.ORG link : CVE-2021-38377


JSON object : View

Products Affected

open-xchange

  • ox_app_suite
CWE
CWE-330

Use of Insufficiently Random Values