open-xchange CVE Vulnerabilities & Metrics

Focus on open-xchange vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About open-xchange Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with open-xchange. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total open-xchange CVEs: 216
Earliest CVE date: 01 Jun 2006, 10:02 UTC
Latest CVE date: 14 May 2024, 18:15 UTC

Latest CVE reference: CVE-2024-4367

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -98.31%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -98.31%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical open-xchange CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.16

Max CVSS: 8.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 98
4.0-6.9 145
7.0-8.9 8
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS open-xchange CVEs

These are the five CVEs with the highest CVSS scores for open-xchange, sorted by severity first and recency.

All CVEs for open-xchange

CVE-2024-4367 open-xchange vulnerability CVSS: 0 14 May 2024, 18:15 UTC

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

CVE-2023-41708 open-xchange vulnerability CVSS: 0 12 Feb 2024, 09:15 UTC

References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.

CVE-2023-41707 open-xchange vulnerability CVSS: 0 12 Feb 2024, 09:15 UTC

Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.

CVE-2023-41706 open-xchange vulnerability CVSS: 0 12 Feb 2024, 09:15 UTC

Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.

CVE-2023-41705 open-xchange vulnerability CVSS: 0 12 Feb 2024, 09:15 UTC

Processing of user-defined DAV user-agent strings is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of DAV user-agents now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.

CVE-2023-41704 open-xchange vulnerability CVSS: 0 12 Feb 2024, 09:15 UTC

Processing of CID references at E-Mail can be abused to inject malicious script code that passes the sanitization engine. Malicious script code could be injected to a users sessions when interacting with E-Mails. Please deploy the provided updates and patch releases. CID handing has been improved and resulting content is checked for malicious content. No publicly available exploits are known.

CVE-2023-41703 open-xchange vulnerability CVSS: 0 12 Feb 2024, 09:15 UTC

User ID references at mentions in document comments were not correctly sanitized. Script code could be injected to a users session when working with a malicious document. Please deploy the provided updates and patch releases. User-defined content like comments and mentions are now filtered to avoid potentially malicious content. No publicly available exploits are known.

CVE-2023-41710 open-xchange vulnerability CVSS: 0 08 Jan 2024, 09:15 UTC

User-defined script code could be stored for a upsell related shop URL. This code was not correctly sanitized when adding it to DOM. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.

CVE-2023-29052 open-xchange vulnerability CVSS: 0 08 Jan 2024, 09:15 UTC

Users were able to define disclaimer texts for an upsell shop dialog that would contain script code that was not sanitized correctly. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.

CVE-2023-29051 open-xchange vulnerability CVSS: 0 08 Jan 2024, 09:15 UTC

User-defined OXMF templates could be used to access a limited part of the internal OX App Suite Java API. The existing switch to disable the feature by default was not effective in this case. Unauthorized users could discover and modify application state, including objects related to other users and contexts. We now make sure that the switch to disable user-generated templates by default works as intended and will remove the feature in future generations of the product. No publicly available exploits are known.

CVE-2023-29050 open-xchange vulnerability CVSS: 0 08 Jan 2024, 09:15 UTC

The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.

CVE-2023-29049 open-xchange vulnerability CVSS: 0 08 Jan 2024, 09:15 UTC

The "upsell" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known.

CVE-2023-29048 open-xchange vulnerability CVSS: 0 08 Jan 2024, 09:15 UTC

A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known.

CVE-2023-29047 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.

CVE-2023-29046 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.

CVE-2023-29045 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.

CVE-2023-29044 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Documents operations could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now get escaped to avoid code execution. No publicly available exploits are known.

CVE-2023-29043 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known.

CVE-2023-26456 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.

CVE-2023-26455 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

CVE-2023-26454 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.

CVE-2023-26453 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Requests to cache an image could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.

CVE-2023-26452 open-xchange vulnerability CVSS: 0 02 Nov 2023, 14:15 UTC

Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.

CVE-2023-26451 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.

CVE-2023-26450 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.

CVE-2023-26449 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

The "OX Chat" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.

CVE-2023-26448 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.

CVE-2023-26447 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

The "upsell" widget for the portal allows to specify a product description. This description taken from a user-controllable jslob did not get escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content. No publicly available exploits are known.

CVE-2023-26446 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.

CVE-2023-26445 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

Frontend themes are defined by user-controllable jslob settings and could point to a malicious resource which gets processed during login. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the theme value and use a default fallback if no theme matches. No publicly available exploits are known.

CVE-2023-26443 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

Full-text autocomplete search allows user-provided SQL syntax to be injected to SQL statements. With existing sanitization in place, this can be abused to trigger benign SQL Exceptions but could potentially be escalated to a malicious SQL injection vulnerability. We now properly encode single quotes for SQL FULLTEXT queries. No publicly available exploits are known.

CVE-2023-26442 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

In case Cacheservice was configured to use a sproxyd object-storage backend, it would follow HTTP redirects issued by that backend. An attacker with access to a local or restricted network with the capability to intercept and replay HTTP requests to sproxyd (or who is in control of the sproxyd service) could perform a server-side request-forgery attack and make Cacheservice connect to unexpected resources. We have disabled the ability to follow HTTP redirects when connecting to sproxyd resources. No publicly available exploits are known.

CVE-2023-26441 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVE-2023-26440 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

The cacheservice API could be abused to indirectly inject parameters with SQL syntax which was insufficiently sanitized and would later be executed when creating new cache groups. Attackers with access to a local or restricted network could perform arbitrary SQL queries. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known.

CVE-2023-26439 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

The cacheservice API could be abused to inject parameters with SQL syntax which was insufficiently sanitized before getting executed as SQL statement. Attackers with access to a local or restricted network were able to perform arbitrary SQL queries, discovering other users cached data. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known.

CVE-2023-26438 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS cache expiry correctly were able to inject configuration that would bypass existing network deny-lists. Attackers could exploit this weakness to discover the existence of restricted network infrastructure and service availability. Improvements were made to include deny-lists not only during the check of the provided connection data, but also during use. No publicly available exploits are known.

CVE-2023-26430 open-xchange vulnerability CVSS: 0 02 Aug 2023, 13:15 UTC

Attackers with access to user accounts can inject arbitrary control characters to SIEVE mail-filter rules. This could be abused to access SIEVE extension that are not allowed by App Suite or to inject rules which would break per-user filter processing, requiring manual cleanup of such rules. We have added sanitization to all mail-filter APIs to avoid forwardning control characters to subsystems. No publicly available exploits are known.

CVE-2023-26436 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

Attackers with access to the "documentconverterws" API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API endpoint is restricted to local networks by default. Arbitrary code could be injected that is being executed when processing the request. A check has been introduced to restrict processing of legal and expected classes for this API. We now log a warning in case there are attempts to inject illegal classes. No publicly available exploits are known.

CVE-2023-26435 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and services as well as including local files with read permissions of the open-xchange system user. This was limited to specific file-types, like images. We have improved existing content filters and validators to avoid including any local resources. No publicly available exploits are known.

CVE-2023-26434 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted POP3 server response to reasonable length/size. No publicly available exploits are known.

CVE-2023-26433 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

When adding an external mail account, processing of IMAP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue IMAP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted IMAP server response to reasonable length/size. No publicly available exploits are known.

CVE-2023-26432 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known.

CVE-2023-26431 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.

CVE-2023-26429 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.

CVE-2023-26428 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

Attackers can successfully request arbitrary snippet IDs, including E-Mail signatures of other users within the same context. Signatures of other users could be read even though they are not explicitly shared. We improved permission handling when requesting snippets that are not explicitly shared with other users. No publicly available exploits are known.

CVE-2023-26427 open-xchange vulnerability CVSS: 0 20 Jun 2023, 08:15 UTC

Default permissions for a properties file were too permissive. Local system users could read potentially sensitive information. We updated the default permissions for noreply.properties set during package installation. No publicly available exploits are known.

CVE-2023-24605 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before backend 7.10.6-rev37 does not enforce 2FA for all endpoints, e.g., reading from a drive, reading contact data, and renaming tokens.

CVE-2023-24604 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before backend 7.10.6-rev37 does not check HTTP header lengths when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of header data.

CVE-2023-24603 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before backend 7.10.6-rev37 does not check size limits when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of data.

CVE-2023-24602 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before frontend 7.10.6-rev24 allows XSS via data to the Tumblr portal widget, such as a post title.

CVE-2023-24601 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before frontend 7.10.6-rev24 allows XSS via a non-app deeplink such as the jslob API's registry sub-tree.

CVE-2023-24600 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before backend 7.10.6-rev37 allows authenticated users to bypass access controls (for reading contacts) via a move to their own address book.

CVE-2023-24599 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before backend 7.10.6-rev37 allows authenticated users to change the appointments of arbitrary users via conflicting ID numbers, aka "ID confusion."

CVE-2023-24598 open-xchange vulnerability CVSS: 0 29 May 2023, 03:15 UTC

OX App Suite before backend 7.10.6-rev37 has an information leak in the handling of distribution lists, e.g., partial disclosure of the private contacts of another user.

CVE-2023-24597 open-xchange vulnerability CVSS: 0 29 May 2023, 02:15 UTC

OX App Suite before frontend 7.10.6-rev24 allows the loading (without user consent) of an e-mail message's remote resources during printing.

CVE-2022-37306 open-xchange vulnerability CVSS: 0 16 Apr 2023, 02:15 UTC

OX App Suite before 7.10.6-rev30 allows XSS via an upsell trigger.

CVE-2022-43699 open-xchange vulnerability CVSS: 0 15 Apr 2023, 02:15 UTC

OX App Suite before 7.10.6-rev30 allows SSRF because e-mail account discovery disregards the deny-list and thus can be attacked by an adversary who controls the DNS records of an external domain (found in the host part of an e-mail address).

CVE-2022-43698 open-xchange vulnerability CVSS: 0 15 Apr 2023, 02:15 UTC

OX App Suite before 7.10.6-rev30 allows SSRF because changing a POP3 account disregards the deny-list.

CVE-2022-43697 open-xchange vulnerability CVSS: 0 15 Apr 2023, 02:15 UTC

OX App Suite before 7.10.6-rev30 allows XSS via an activity tracking adapter defined by jslob.

CVE-2022-43696 open-xchange vulnerability CVSS: 0 15 Apr 2023, 02:15 UTC

OX App Suite before 7.10.6-rev20 allows XSS via upsell ads.

CVE-2022-37310 open-xchange vulnerability CVSS: 0 26 Dec 2022, 04:15 UTC

OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI.

CVE-2022-37309 open-xchange vulnerability CVSS: 0 26 Dec 2022, 04:15 UTC

OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name.

CVE-2022-29853 open-xchange vulnerability CVSS: 0 26 Dec 2022, 04:15 UTC

OX App Suite through 8.2 allows XSS via a certain complex hierarchy that forces use of Show Entire Message for a huge HTML e-mail message.

CVE-2022-29852 open-xchange vulnerability CVSS: 0 26 Dec 2022, 04:15 UTC

OX App Suite through 8.2 allows XSS because BMFreehand10 and image/x-freehand are not blocked.

CVE-2022-37308 open-xchange vulnerability CVSS: 0 26 Dec 2022, 03:15 UTC

OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages.

CVE-2022-37313 open-xchange vulnerability CVSS: 0 26 Dec 2022, 02:15 UTC

OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record.

CVE-2022-37312 open-xchange vulnerability CVSS: 0 26 Dec 2022, 02:15 UTC

OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large request body containing a redirect URL to the deferrer servlet.

CVE-2022-37311 open-xchange vulnerability CVSS: 0 26 Dec 2022, 02:15 UTC

OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large location request parameter to the redirect servlet.

CVE-2022-37307 open-xchange vulnerability CVSS: 0 26 Dec 2022, 02:15 UTC

OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature.

CVE-2022-31469 open-xchange vulnerability CVSS: 0 26 Dec 2022, 02:15 UTC

OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class="deep-link-app" for a /#!!&app=%2e./ URI.

CVE-2022-31468 open-xchange vulnerability CVSS: 0 25 Oct 2022, 19:15 UTC

OX App Suite through 8.2 allows XSS via an attachment or OX Drive content when a client uses the len or off parameter.

CVE-2022-29851 open-xchange vulnerability CVSS: 0 25 Oct 2022, 17:15 UTC

documentconverter in OX App Suite through 7.10.6, in a non-default configuration with ghostscript, allows OS Command Injection because file conversion may occur for an EPS document that is disguised as a PDF document.

CVE-2022-24406 open-xchange vulnerability CVSS: 0 27 Jul 2022, 14:15 UTC

OX App Suite through 7.10.6 allows SSRF because multipart/form-data boundaries are predictable, and this can lead to injection into internal Documentconverter API calls.

CVE-2022-24405 open-xchange vulnerability CVSS: 0 27 Jul 2022, 14:15 UTC

OX App Suite through 7.10.6 allows OS Command Injection via a serialized Java class to the Documentconverter API.

CVE-2022-23101 open-xchange vulnerability CVSS: 0 27 Jul 2022, 14:15 UTC

OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message.

CVE-2022-23100 open-xchange vulnerability CVSS: 0 27 Jul 2022, 14:15 UTC

OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment).

CVE-2022-23099 open-xchange vulnerability CVSS: 0 27 Jul 2022, 14:15 UTC

OX App Suite through 7.10.6 allows XSS by forcing block-wise read.

CVE-2021-44213 open-xchange vulnerability CVSS: 4.3 28 Mar 2022, 02:15 UTC

OX App Suite through 7.10.5 allows XSS via uuencoding in a multipart/alternative message.

CVE-2021-44212 open-xchange vulnerability CVSS: 4.3 28 Mar 2022, 02:15 UTC

OX App Suite through 7.10.5 allows XSS via a trailing control character such as the SCRIPT\t substring.

CVE-2021-44211 open-xchange vulnerability CVSS: 3.5 28 Mar 2022, 01:15 UTC

OX App Suite through 7.10.5 allows XSS via the class attribute of an element in an HTML e-mail signature.

CVE-2021-44210 open-xchange vulnerability CVSS: 4.3 28 Mar 2022, 01:15 UTC

OX App Suite through 7.10.5 allows XSS via NIFF (Notation Interchange File Format) data.

CVE-2021-44209 open-xchange vulnerability CVSS: 4.3 28 Mar 2022, 01:15 UTC

OX App Suite through 7.10.5 allows XSS via an HTML 5 element such as AUDIO.

CVE-2021-44208 open-xchange vulnerability CVSS: 4.3 28 Mar 2022, 01:15 UTC

OX App Suite through 7.10.5 allows XSS via an unknown system message in Chat.

CVE-2021-38378 open-xchange vulnerability CVSS: 4.0 22 Nov 2021, 09:15 UTC

OX App Suite 7.10.5 allows Information Exposure because a caching mechanism can caused a Modified By response to show a person's name.

CVE-2021-38377 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 09:15 UTC

OX App Suite through 7.10.5 allows XSS via JavaScript code in an anchor HTML comment within truncated e-mail, because there is a predictable UUID with HTML transformation results.

CVE-2021-38376 open-xchange vulnerability CVSS: 5.0 22 Nov 2021, 09:15 UTC

OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call.

CVE-2021-38375 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 09:15 UTC

OX App Suite through 7.10.5 allows XSS via the alt attribute of an IMG element in a truncated e-mail message.

CVE-2021-38374 open-xchange vulnerability CVSS: 3.5 22 Nov 2021, 09:15 UTC

OX App Suite through through 7.10.5 allows XSS via a crafted snippet that has an app loader reference within an app loader URL.

CVE-2021-33495 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 09:15 UTC

OX App Suite 7.10.5 allows XSS via an OX Chat system message.

CVE-2021-33494 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 09:15 UTC

OX App Suite 7.10.5 allows XSS via an OX Chat room title during typing rendering.

CVE-2021-33493 open-xchange vulnerability CVSS: 3.6 22 Nov 2021, 09:15 UTC

The middleware component in OX App Suite through 7.10.5 allows Code Injection via Java classes in a YAML format.

CVE-2021-33492 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 09:15 UTC

OX App Suite 7.10.5 allows XSS via an OX Chat room name.

CVE-2021-33491 open-xchange vulnerability CVSS: 4.0 22 Nov 2021, 09:15 UTC

OX App Suite through 7.10.5 allows Directory Traversal via ../ in an OOXML or ODF ZIP archive, because of the mishandling of relative paths in mail addresses in conjunction with auto-configuration DNS records.

CVE-2021-33490 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 08:15 UTC

OX App Suite through 7.10.5 allows XSS via a crafted snippet in a shared mail signature.

CVE-2021-33489 open-xchange vulnerability CVSS: 4.3 22 Nov 2021, 08:15 UTC

OX App Suite through 7.10.5 allows XSS via JavaScript code in a shared XCF file.

CVE-2021-33488 open-xchange vulnerability CVSS: 5.8 22 Nov 2021, 08:15 UTC

chat in OX App Suite 7.10.5 has Improper Input Validation. A user can be redirected to a rogue OX Chat server via a development-related hook.

CVE-2021-28095 open-xchange vulnerability CVSS: 5.8 30 Jul 2021, 14:15 UTC

OX Documents before 7.10.5-rev5 has Incorrect Access Control for documents that contain XML structures because hash collisions can occur, due to use of CRC32.

CVE-2021-28094 open-xchange vulnerability CVSS: 6.4 30 Jul 2021, 14:15 UTC

OX Documents before 7.10.5-rev7 has Incorrect Access Control for converted documents because hash collisions can occur, due to use of CRC32.

CVE-2021-28093 open-xchange vulnerability CVSS: 6.4 30 Jul 2021, 14:15 UTC

OX Documents before 7.10.5-rev5 has Incorrect Access Control of converted images because hash collisions can occur, due to use of Adler32.

CVE-2021-37403 open-xchange vulnerability CVSS: 4.3 22 Jul 2021, 17:15 UTC

OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and an App Loader relative URL is used.

CVE-2021-37402 open-xchange vulnerability CVSS: 4.3 22 Jul 2021, 17:15 UTC

OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via binary data that is mishandled when the legacy dataretrieval endpoint has been enabled.

CVE-2021-26699 open-xchange vulnerability CVSS: 5.8 22 Jul 2021, 17:15 UTC

OX App Suite before 7.10.3-rev4 and 7.10.4 before 7.10.4-rev4 allows SSRF via a shared SVG document that is mishandled by the imageconverter component when the .png extension is used.

CVE-2021-26698 open-xchange vulnerability CVSS: 4.3 22 Jul 2021, 17:15 UTC

OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and the dl parameter is used.

CVE-2020-28945 open-xchange vulnerability CVSS: 4.3 03 May 2021, 20:15 UTC

OX App Suite 7.10.4 and earlier allows XSS via crafted content to reach an undocumented feature, such as ![](http://onerror=Function.constructor, in a Notes item.

CVE-2021-31935 open-xchange vulnerability CVSS: 4.3 30 Apr 2021, 22:15 UTC

OX App Suite 7.10.4 and earlier allows XSS via a crafted distribution list (payload in the common name) that is mishandled in the scheduling view.

CVE-2021-31934 open-xchange vulnerability CVSS: 4.3 30 Apr 2021, 22:15 UTC

OX App Suite 7.10.4 and earlier allows XSS via a crafted contact object (payload in the position or company field) that is mishandled in the App Suite UI on a smartphone.

CVE-2020-28944 open-xchange vulnerability CVSS: 5.0 30 Apr 2021, 22:15 UTC

OX Guard 2.10.4 and earlier allows a Denial of Service via a WKS server that responds slowly or with a large amount of data.

CVE-2020-28943 open-xchange vulnerability CVSS: 4.0 30 Apr 2021, 22:15 UTC

OX App Suite 7.10.4 and earlier allows SSRF via a snippet.

CVE-2021-23936 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via the subject of a task.

CVE-2021-23935 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via an appointment in which the location contains JavaScript code.

CVE-2021-23934 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via a contact whose name contains JavaScript code.

CVE-2021-23933 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via JavaScript in a Note referenced by a mail:// URL.

CVE-2021-23932 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via an inline image with a crafted filename.

CVE-2021-23931 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via an inline binary file.

CVE-2021-23930 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via use of the conversion API for a distributedFile.

CVE-2021-23929 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows XSS via a crafted Content-Disposition header in an uploaded HTML document to an ajax/share/<share-token>?delivery=view URI.

CVE-2021-23928 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.3 allows XSS via the ajax/apps/manifests query string.

CVE-2021-23927 open-xchange vulnerability CVSS: 5.5 12 Jan 2021, 22:15 UTC

OX App Suite through 7.10.4 allows SSRF via a URL with an @ character in an appsuite/api/oauth/proxy PUT request.

CVE-2020-24701 open-xchange vulnerability CVSS: 4.3 12 Jan 2021, 08:15 UTC

OX App Suite through 7.10.4 allows XSS via the app loading mechanism (the PATH_INFO to the /appsuite URI).

CVE-2020-24700 open-xchange vulnerability CVSS: 5.5 12 Jan 2021, 08:15 UTC

OX App Suite through 7.10.3 allows SSRF because GET requests are sent to arbitrary domain names with an initial autoconfig. substring.

CVE-2020-15004 open-xchange vulnerability CVSS: 3.5 23 Oct 2020, 05:15 UTC

OX App Suite through 7.10.3 allows stats/diagnostic?param= XSS.

CVE-2020-15003 open-xchange vulnerability CVSS: 4.0 23 Oct 2020, 05:15 UTC

OX App Suite through 7.10.3 allows Information Exposure because a user can obtain the IP address and User-Agent string of a different user (via the session API during shared Drive access).

CVE-2020-15002 open-xchange vulnerability CVSS: 4.0 23 Oct 2020, 05:15 UTC

OX App Suite through 7.10.3 allows SSRF via the the /ajax/messaging/message message API.

CVE-2020-12646 open-xchange vulnerability CVSS: 3.5 31 Aug 2020, 15:15 UTC

OX App Suite 7.10.3 and earlier allows XSS via text/x-javascript, text/rdf, or a PDF document.

CVE-2020-12645 open-xchange vulnerability CVSS: 5.0 31 Aug 2020, 15:15 UTC

OX App Suite 7.10.1 to 7.10.3 has improper input validation for rate limits with a crafted User-Agent header, spoofed vacation notices, and /apps/load memory consumption.

CVE-2020-12644 open-xchange vulnerability CVSS: 4.0 31 Aug 2020, 15:15 UTC

OX App Suite 7.10.3 and earlier allows SSRF, related to the mail account API and the /folder/list API.

CVE-2020-12643 open-xchange vulnerability CVSS: 4.0 31 Aug 2020, 15:15 UTC

OX App Suite 7.10.3 and earlier has Incorrect Access Control via an /api/subscriptions request for a snippet containing an email address.

CVE-2020-8544 open-xchange vulnerability CVSS: 4.0 16 Jun 2020, 14:15 UTC

OX App Suite through 7.10.3 allows SSRF.

CVE-2020-8543 open-xchange vulnerability CVSS: 5.0 16 Jun 2020, 14:15 UTC

OX App Suite through 7.10.3 has Improper Input Validation.

CVE-2020-8542 open-xchange vulnerability CVSS: 3.5 16 Jun 2020, 14:15 UTC

OX App Suite through 7.10.3 allows XSS.

CVE-2020-8541 open-xchange vulnerability CVSS: 4.0 16 Jun 2020, 14:15 UTC

OX App Suite through 7.10.3 allows XXE attacks.

CVE-2020-9427 open-xchange vulnerability CVSS: 4.0 15 Jun 2020, 15:15 UTC

OX Guard 2.10.3 and earlier allows SSRF.

CVE-2020-9426 open-xchange vulnerability CVSS: 4.3 15 Jun 2020, 15:15 UTC

OX Guard 2.10.3 and earlier allows XSS.

CVE-2019-18846 open-xchange vulnerability CVSS: 4.0 21 Feb 2020, 21:15 UTC

OX App Suite through 7.10.2 allows SSRF.

CVE-2014-5236 open-xchange vulnerability CVSS: 5.0 31 Jan 2020, 22:15 UTC

Multiple absolute path traversal vulnerabilities in documentconverter in Open-Xchange (OX) AppSuite before 7.4.2-rev10 and 7.6.x before 7.6.0-rev10 allow remote attackers to read application files via a full pathname in a crafted (1) OLE Object or (2) image in an OpenDocument text file.

CVE-2014-5238 open-xchange vulnerability CVSS: 6.8 14 Jan 2020, 16:15 UTC

XML external entity (XXE) vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev11 and 7.6.x before 7.6.0-rev9 allows remote attackers to read arbitrary files and possibly other unspecified impact via a crafted OpenDocument Text document.

CVE-2019-16717 open-xchange vulnerability CVSS: 4.3 06 Jan 2020, 20:15 UTC

OX App Suite through 7.10.2 has XSS.

CVE-2019-16716 open-xchange vulnerability CVSS: 8.5 06 Jan 2020, 20:15 UTC

OX App Suite through 7.10.2 has Incorrect Access Control.

CVE-2013-7486 open-xchange vulnerability CVSS: 4.3 02 Jan 2020, 19:15 UTC

Cross-site scripting (XSS) vulnerability in the backend in Open-Xchange (OX) AppSuite 7.2.x before 7.2.2-rev27 and 7.4.x before 7.4.0-rev20 allows remote attackers to inject arbitrary web script or HTML via the body of an email. NOTE: this vulnerability was SPLIT from CVE-2013-6242 because it affects different sets of versions.

CVE-2013-7485 open-xchange vulnerability CVSS: 4.3 02 Jan 2020, 19:15 UTC

Cross-site scripting (XSS) vulnerability in the backend in Open-Xchange (OX) AppSuite 7.2.x before 7.2.2-rev26 and 7.4.x before 7.4.0-rev16 allows remote attackers to inject arbitrary web script or HTML via the publication name, which is not properly handled in an error message. NOTE: this vulnerability was SPLIT from CVE-2013-6242 because it affects different sets of versions.

CVE-2013-6242 open-xchange vulnerability CVSS: 4.3 02 Jan 2020, 19:15 UTC

Cross-site scripting (XSS) vulnerability in the frontend in Open-Xchange (OX) AppSuite 6.22.3 before 6.22.3-rev5 and 6.22.4 before 6.22.4-rev12 allows remote attackers to inject arbitrary web script or HTML via the subject of an email. NOTE: the vulnerabilities related to the body of the email and the publication name were SPLIT from this CVE ID because they affect different sets of versions.

CVE-2019-14227 open-xchange vulnerability CVSS: 4.3 14 Oct 2019, 17:15 UTC

OX App Suite 7.10.1 and 7.10.2 allows XSS.

CVE-2019-14226 open-xchange vulnerability CVSS: 5.5 14 Oct 2019, 17:15 UTC

OX App Suite through 7.10.2 has Insecure Permissions.

CVE-2019-14225 open-xchange vulnerability CVSS: 5.5 14 Oct 2019, 17:15 UTC

OX App Suite 7.10.1 and 7.10.2 allows SSRF.

CVE-2019-11806 open-xchange vulnerability CVSS: 2.1 20 Aug 2019, 13:15 UTC

OX App Suite 7.10.1 and earlier has Insecure Permissions.

CVE-2019-11522 open-xchange vulnerability CVSS: 3.5 20 Aug 2019, 13:15 UTC

OX App Suite 7.10.0 to 7.10.2 allows XSS.

CVE-2019-11521 open-xchange vulnerability CVSS: 5.8 20 Aug 2019, 13:15 UTC

OX App Suite 7.10.1 allows Content Spoofing.

CVE-2018-10986 open-xchange vulnerability CVSS: 6.8 03 Jul 2019, 17:15 UTC

OX Guard 2.8.0 has CSRF.

CVE-2019-7159 open-xchange vulnerability CVSS: 5.0 18 Jun 2019, 13:15 UTC

OX App Suite 7.10.1 and earlier allows Information Exposure.

CVE-2019-7158 open-xchange vulnerability CVSS: 7.5 17 Jun 2019, 20:15 UTC

OX App Suite 7.10.0 and earlier has Incorrect Access Control.

CVE-2017-13667 open-xchange vulnerability CVSS: 6.5 23 May 2019, 18:29 UTC

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.

CVE-2017-13668 open-xchange vulnerability CVSS: 3.5 23 May 2019, 16:29 UTC

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2017-5213 open-xchange vulnerability CVSS: 4.3 23 May 2019, 15:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2017-5212 open-xchange vulnerability CVSS: 7.5 23 May 2019, 15:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 is affected by: Incorrect Access Control.

CVE-2017-5211 open-xchange vulnerability CVSS: 5.0 23 May 2019, 15:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Content Spoofing.

CVE-2017-5210 open-xchange vulnerability CVSS: 5.0 23 May 2019, 15:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Information Exposure.

CVE-2017-17061 open-xchange vulnerability CVSS: 3.5 23 May 2019, 15:29 UTC

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2017-17060 open-xchange vulnerability CVSS: 7.5 23 May 2019, 15:29 UTC

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Insecure Permissions.

CVE-2017-15030 open-xchange vulnerability CVSS: 4.3 23 May 2019, 15:29 UTC

Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2017-15029 open-xchange vulnerability CVSS: 4.0 23 May 2019, 15:29 UTC

Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: SSRF.

CVE-2017-9808 open-xchange vulnerability CVSS: 4.3 22 May 2019, 20:29 UTC

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2017-8777 open-xchange vulnerability CVSS: 6.5 22 May 2019, 20:29 UTC

Open-Xchange GmbH OX Cloud Plugins 1.4.0 and earlier is affected by: Missing Authorization.

CVE-2017-8341 open-xchange vulnerability CVSS: 5.0 22 May 2019, 20:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Content Spoofing.

CVE-2017-8340 open-xchange vulnerability CVSS: 6.5 22 May 2019, 20:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.

CVE-2017-6912 open-xchange vulnerability CVSS: 6.5 22 May 2019, 20:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.

CVE-2017-5864 open-xchange vulnerability CVSS: 4.3 22 May 2019, 20:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2017-5863 open-xchange vulnerability CVSS: 7.5 22 May 2019, 20:29 UTC

Open-Xchange GmbH OX App Suite 7.8.3 and earlier is affected by: Incorrect Access Control.

CVE-2017-9809 open-xchange vulnerability CVSS: 5.0 22 May 2019, 19:29 UTC

OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Information Exposure.

CVE-2017-12884 open-xchange vulnerability CVSS: 5.0 10 May 2019, 16:29 UTC

OX Software GmbH App Suite 7.8.4 and earlier is affected by: Information Exposure.

CVE-2017-12885 open-xchange vulnerability CVSS: 4.3 10 May 2019, 15:29 UTC

OX Software GmbH App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS).

CVE-2018-13104 open-xchange vulnerability CVSS: 3.5 21 Mar 2019, 16:00 UTC

OX App Suite 7.8.4 and earlier allows XSS. Internal reference: 58742 (Bug ID)

CVE-2018-13103 open-xchange vulnerability CVSS: 5.5 21 Mar 2019, 16:00 UTC

OX App Suite 7.8.4 and earlier allows SSRF.

CVE-2018-12611 open-xchange vulnerability CVSS: 4.3 30 Jan 2019, 15:29 UTC

OX App Suite 7.8.4 and earlier allows Directory Traversal.

CVE-2018-12610 open-xchange vulnerability CVSS: 5.0 30 Jan 2019, 15:29 UTC

OX App Suite 7.8.4 and earlier allows Information Exposure.

CVE-2018-12609 open-xchange vulnerability CVSS: 4.0 30 Jan 2019, 15:29 UTC

OX App Suite 7.8.4 and earlier allows Server-Side Request Forgery.

CVE-2017-6913 open-xchange vulnerability CVSS: 4.3 18 Sep 2018, 20:29 UTC

Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag.

CVE-2018-9998 open-xchange vulnerability CVSS: 4.0 05 Jul 2018, 20:29 UTC

Open-Xchange OX App Suite before 7.6.3-rev37, 7.8.x before 7.8.2-rev40, 7.8.3 before 7.8.3-rev48, and 7.8.4 before 7.8.4-rev28 include folder names in API error responses, which allows remote attackers to obtain sensitive information via the folder parameter in an "all" action to api/tasks.

CVE-2018-9997 open-xchange vulnerability CVSS: 4.3 05 Jul 2018, 20:29 UTC

Cross-site scripting (XSS) vulnerability in mail compose in Open-Xchange OX App Suite before 7.6.3-rev31, 7.8.x before 7.8.2-rev31, 7.8.3 before 7.8.3-rev41, and 7.8.4 before 7.8.4-rev28 allows remote attackers to inject arbitrary web script or HTML via the data-target attribute in an HTML page with data-toggle gadgets.

CVE-2018-5756 open-xchange vulnerability CVSS: 4.0 16 Jun 2018, 01:29 UTC

The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 does not properly check for folder-to-object association, which allows remote authenticated users to delete arbitrary tasks via the task id in a delete action to api/tasks.

CVE-2018-5755 open-xchange vulnerability CVSS: 7.1 16 Jun 2018, 01:29 UTC

Absolute path traversal vulnerability in the readerengine component in Open-Xchange OX App Suite before 7.6.3-rev3, 7.8.x before 7.8.2-rev4, 7.8.3 before 7.8.3-rev5, and 7.8.4 before 7.8.4-rev4 allows remote attackers to read arbitrary files via a full pathname in a formula in a spreadsheet.

CVE-2018-5754 open-xchange vulnerability CVSS: 3.5 16 Jun 2018, 01:29 UTC

Cross-site scripting (XSS) vulnerability in the office-web component in Open-Xchange OX App Suite before 7.8.3-rev12 and 7.8.4 before 7.8.4-rev9 allows remote attackers to inject arbitrary web script or HTML via a crafted presentation file, related to copying content to the clipboard.

CVE-2018-5753 open-xchange vulnerability CVSS: 4.0 16 Jun 2018, 01:29 UTC

The frontend component in Open-Xchange OX App Suite before 7.6.3-rev31, 7.8.x before 7.8.2-rev31, 7.8.3 before 7.8.3-rev41, and 7.8.4 before 7.8.4-rev20 allows remote attackers to spoof the origin of e-mails via unicode characters in the "personal part" of a (1) From or (2) Sender address.

CVE-2018-5752 open-xchange vulnerability CVSS: 6.5 16 Jun 2018, 01:29 UTC

The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors involving non-decimal representations of IP addresses and special IPv6 related addresses.

CVE-2018-5751 open-xchange vulnerability CVSS: 4.0 16 Jun 2018, 01:29 UTC

The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote authenticated users to obtain sensitive information about external guest users via vectors related to the "groups" and "users" APIs.

CVE-2017-17062 open-xchange vulnerability CVSS: 4.0 16 Jun 2018, 01:29 UTC

The backend component in Open-Xchange OX App Suite before 7.6.3-rev35, 7.8.x before 7.8.2-rev38, 7.8.3 before 7.8.3-rev41, and 7.8.4 before 7.8.4-rev19 allows remote authenticated users to save arbitrary user attributes by leveraging improper privilege management.

CVE-2014-2078 open-xchange vulnerability CVSS: 5.0 10 Apr 2018, 15:29 UTC

The backend in Open-Xchange (OX) AppSuite 7.4.2 before 7.4.2-rev9 allows remote attackers to obtain sensitive information about user email addresses in opportunistic circumstances by leveraging a failure in e-mail auto configuration for external accounts.

CVE-2015-1588 open-xchange vulnerability CVSS: 4.3 08 Jun 2017, 21:29 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange Server 6 and OX AppSuite before 7.4.2-rev43, 7.6.0-rev38, and 7.6.1-rev21.

CVE-2016-6846 open-xchange vulnerability CVSS: 4.3 29 Mar 2017, 14:59 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite backend before 7.6.2-rev59, 7.8.0 before 7.8.0-rev38, 7.8.2 before 7.8.2-rev8; AppSuite frontend before 7.6.2-rev47, 7.8.0 before 7.8.0-rev30, and 7.8.2 before 7.8.2-rev8; Office Web before 7.6.2-rev16, 7.8.0 before 7.8.0-rev10, and 7.8.2 before 7.8.2-rev5; and Documentconverter-API before 7.8.2-rev5 allows remote attackers to inject arbitrary web script or HTML.

CVE-2016-6854 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX Guard before 2.4.2-rev5. Script code which got injected to a mail with inline PGP signature gets executed when verifying the signature. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6853 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX Guard before 2.4.2-rev5. Script code and references to external websites can be injected to the names of PGP public keys. When requesting that key later on using a specific URL, such script code might get executed. In case of injecting external websites, users might get lured into a phishing scheme. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6852 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Users can provide local file paths to the RSS reader; the response and error code give hints about whether the provided file exists or not. Attackers may discover specific system files or library versions on the middleware server to prepare further attacks.

CVE-2016-6851 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX Guard before 2.4.2-rev5. Script code can be provided as parameter to the OX Guard guest reader web application. This allows cross-site scripting attacks against arbitrary users since no prior authentication is needed. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.) in case the user has an active session on the same domain already.

CVE-2016-6850 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. SVG files can be used as profile pictures. In case their XML structure contains iframes and script code, that code may get executed when calling the related picture URL or viewing the related person's image within a browser. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6848 open-xchange vulnerability CVSS: 1.9 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. API requests can be used to inject, generate and download executable files to the client ("Reflected File Download"). Malicious platform specific (e.g. Microsoft Windows) batch file can be created via a trusted domain without authentication that, if executed by the user, may lead to local code execution.

CVE-2016-6847 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. SVG files can be used as mp3 album covers. In case their XML structure contains script code, that code may get executed when calling the related cover URL. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6845 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Script code within hyperlinks at HTML E-Mails is not getting correctly sanitized when using base64 encoded "data" resources. This allows an attacker to provide hyperlinks that may execute script code instead of directing to a proper location. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6844 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Script code within SVG files is maintained when opening such files "in browser" based on our Mail or Drive app. In case of "a" tags, this may include link targets with base64 encoded "data" references. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6843 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Script code can be injected to contact names. When adding those contacts to a group, the script code gets executed in the context of the user which creates or changes the group by using autocomplete. In most cases this is a user with elevated permissions. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-6842 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Setting the user's name to JS code makes that code execute when selecting that user's "Templates" folder from OX Documents settings. This requires the folder to be shared to the victim. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-5740 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev5. JavaScript code can be used as part of ical attachments within scheduling E-Mails. This content, for example an appointment's location, will be presented to the user at the E-Mail App, depending on the invitation workflow. This code gets executed within the context of the user's current session. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

CVE-2016-5124 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev14. Adding images from external sources to HTML editors by drag&drop can potentially lead to script code execution in the context of the active user. To exploit this, a user needs to be tricked to use an image from a specially crafted website and add it to HTML editor areas of OX App Suite, for example E-Mail Compose or OX Text. This specific attack circumvents typical XSS filters and detection mechanisms since the code is not loaded from an external service but injected locally. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). To exploit this vulnerability, a attacker needs to convince a user to follow specific steps (social-engineering).

CVE-2016-4048 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev11. Custom messages can be shown at the login screen to notify external users about issues with sharing links. This mechanism can be abused to inject arbitrary text messages. Users may get tricked to follow instructions injected by third parties as part of social engineering attacks.

CVE-2016-4047 open-xchange vulnerability CVSS: 4.0 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev8. References to external Open XML document type definitions (.dtd resources) can be placed within .docx and .xslx files. Those resources were requested when parsing certain parts of the generated document. As a result an attacker can track access to a manipulated document. Usage of a document may get tracked and information about internal infrastructure may get exposed.

CVE-2016-4046 open-xchange vulnerability CVSS: 5.0 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev11. The API to configure external mail accounts can be abused to map and access network components within the trust boundary of the operator. Users can inject arbitrary hosts and ports to API calls. Depending on the response type, content and latency, information about existence of hosts and services can be gathered. Attackers can get internal configuration information about the infrastructure of an operator to prepare subsequent attacks.

CVE-2016-4045 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev11. Script code can be embedded to RSS feeds using a URL notation. In case a user clicks the corresponding link at the RSS reader of App Suite, code gets executed at the context of the user. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). The attacker needs to reside within the same context to make this attack work.

CVE-2016-4028 open-xchange vulnerability CVSS: 3.5 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX Guard before 2.4.0-rev8. OX Guard uses an authentication token to identify and transfer guest users' credentials. The OX Guard API acts as a padding oracle by responding with different error codes depending on whether the provided token matches the encryption padding. In combination with AES-CBC, this allows attackers to guess the correct padding. Attackers may run brute-forcing attacks on the content of the guest authentication token and discover user credentials. For a practical attack vector, the guest users needs to have logged in, the content of the guest user's "OxReaderID" cookie and the value of the "auth" parameter needs to be known to the attacker.

CVE-2016-4027 open-xchange vulnerability CVSS: 3.5 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev10. App Suite frontend offers to control whether a user wants to store cookies that exceed the session duration. This functionality is useful when logging in from clients with reduced privileges or shared environments. However the setting was incorrectly recognized and cookies were stored regardless of this setting when the login was performed using a non-interactive login method. In case the setting was enforced by middleware configuration or the user went through the interactive login page, the workflow was correct. Cookies with authentication information may become available to other users on shared environments. In case the user did not properly log out from the session, third parties with access to the same client can access a user's account.

CVE-2016-4026 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev11. The content sanitizer component has an issue with filtering malicious content in case invalid HTML code is provided. In such cases the filter will output a unsanitized representation of the content. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). Attackers can use this issue for filter evasion to inject script code later on.

CVE-2016-3174 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX AppSuite before 7.8.0-rev27. The "defer" servlet offers to redirect a client to a specified URL. Since some checks were missing, arbitrary URLs could be provided as redirection target. Users can be tricked to follow a link to a trustworthy domain but end up at an unexpected service later on. This vulnerability can be used to prepare and enhance phishing attacks.

CVE-2016-3173 open-xchange vulnerability CVSS: 3.5 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange OX AppSuite before 7.8.0-rev27. The aria-label parameter of tiles at the Portal can be used to inject script code. Those labels use the name of the file (e.g. an image) which gets displayed at the portal application. Using script code at the file name leads to script execution. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). Users actively need to add a file to the portal to enable this attack. In case of shared files however, a internal attacker may modify a previously embedded file to carry a malicious file name. Furthermore this vulnerability can be used to persistently execute code that got injected by a temporary script execution vulnerability.

CVE-2016-2840 open-xchange vulnerability CVSS: 4.3 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange Server 6 / OX AppSuite before 7.8.0-rev26. The "session" parameter for file-download requests can be used to inject script code that gets reflected through the subsequent status page. Malicious script code can be executed within a trusted domain's context. While no OX App Suite specific data can be manipulated, the vulnerability can be exploited without being authenticated and therefore used for social engineering attacks, stealing cookies or redirecting from trustworthy to malicious hosts.

CVE-2015-8542 open-xchange vulnerability CVSS: 4.0 15 Dec 2016, 06:59 UTC

An issue was discovered in Open-Xchange Guard before 2.2.0-rev8. The "getprivkeybyid" API call is used to download a PGP Private Key for a specific user after providing authentication credentials. Clients provide the "id" and "cid" parameter to specify the current user by its user- and context-ID. The "auth" parameter contains a hashed password string which gets created by the client by asking the user to enter his or her OX Guard password. This parameter is used as single point of authentication when accessing PGP Private Keys. In case a user has set the same password as another user, it is possible to download another user's PGP Private Key by iterating the "id" and "cid" parameters. This kind of attack would also be able by brute-forcing login credentials, but since the "id" and "cid" parameters are sequential they are much easier to predict than a user's login name. At the same time, there are some obvious insecure standard passwords that are widely used. A attacker could send the hashed representation of typically weak passwords and randomly fetch Private Key of matching accounts. The attack can be executed by both internal users and "guests" which use the external mail reader.

CVE-2015-5375 open-xchange vulnerability CVSS: 4.3 28 Sep 2015, 16:59 UTC

Cross-site scripting (XSS) vulnerability in unspecified dialogs for printing content in the Front End in Open-Xchange Server 6 and OX App Suite before 6.22.8-rev8, 6.22.9 before 6.22.9-rev15m, 7.x before 7.6.1-rev25, and 7.6.2 before 7.6.2-rev20 allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to object properties.

CVE-2014-9466 open-xchange vulnerability CVSS: 4.0 17 Feb 2015, 15:59 UTC

Open-Xchange (OX) AppSuite and Server before 7.4.2-rev42, 7.6.0 before 7.6.0-rev36, and 7.6.1 before 7.6.1-rev14 does not properly handle directory permissions, which allows remote authenticated users to read files via unspecified vectors, related to the "folder identifier."

CVE-2014-8993 open-xchange vulnerability CVSS: 4.3 07 Jan 2015, 18:59 UTC

Cross-site scripting (XSS) vulnerability in the backend in Open-Xchange (OX) AppSuite before 7.4.2-rev40, 7.6.0 before 7.6.0-rev32, and 7.6.1 before 7.6.1-rev11 allows remote attackers to inject arbitrary web script or HTML via a crafted XHTML file with the application/xhtml+xml MIME type.

CVE-2014-1679 open-xchange vulnerability CVSS: 4.3 05 Jan 2015, 20:59 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite before 7.2.2-rev31, 7.4.0 before 7.4.0-rev27, and 7.4.1 before 7.4.1-rev17 allows remote attackers to inject arbitrary web script or HTML via the header in an attached SVG file.

CVE-2013-6241 open-xchange vulnerability CVSS: 4.0 27 Dec 2014, 18:59 UTC

The Birthday widget in the backend in Open-Xchange (OX) AppSuite 7.2.x before 7.2.2-rev25 and 7.4.x before 7.4.0-rev14, in certain user-id sharing scenarios, does not properly construct a SQL statement for next-year birthdays, which allows remote authenticated users to obtain sensitive birthday, displayname, firstname, and surname information via a birthdays action to api/contacts, aka bug 29315.

CVE-2014-5237 open-xchange vulnerability CVSS: 4.3 01 Dec 2014, 15:59 UTC

Server-side request forgery (SSRF) vulnerability in the documentconverter component in Open-Xchange (OX) AppSuite before 7.4.2-rev10 and 7.6.x before 7.6.0-rev10 allows remote attackers to trigger requests to arbitrary servers and embed arbitrary images via a URL in an embedded image in a Text document, which is not properly handled by the image preview.

CVE-2014-7871 open-xchange vulnerability CVSS: 6.5 21 Nov 2014, 15:59 UTC

SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-5235 open-xchange vulnerability CVSS: 4.3 17 Sep 2014, 14:55 UTC

Cross-site scripting (XSS) vulnerability in the frontend in Open-Xchange (OX) AppSuite before 7.4.2-rev33 and 7.6.x before 7.6.0-rev16 allows remote attackers to inject arbitrary web script or HTML via vectors related to unspecified fields in RSS feeds.

CVE-2014-5234 open-xchange vulnerability CVSS: 4.3 17 Sep 2014, 14:55 UTC

Cross-site scripting (XSS) vulnerability in the backend in Open-Xchange (OX) AppSuite before 7.4.2-rev33 and 7.6.x before 7.6.0-rev16 allows remote attackers to inject arbitrary web script or HTML via a folder publication name.

CVE-2014-2393 open-xchange vulnerability CVSS: 4.3 24 Apr 2014, 05:06 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2014-2392 open-xchange vulnerability CVSS: 4.3 24 Apr 2014, 05:06 UTC

The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.

CVE-2014-2391 open-xchange vulnerability CVSS: 4.3 24 Apr 2014, 05:06 UTC

The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potentially useful password-pattern information by reading (1) a web-server access log, (2) a web-server Referer log, or (3) browser history that contains this string because of its presence in a GET request.

CVE-2014-2077 open-xchange vulnerability CVSS: 4.3 20 Mar 2014, 16:55 UTC

Cross-site scripting (XSS) vulnerability in the frontend in Open-Xchange (OX) AppSuite 7.4.1 before 7.4.1-rev10 and 7.4.2 before 7.4.2-rev8 allows remote attackers to inject arbitrary web script or HTML via the subject of an email, involving 'the aria "tags" for screenreaders at the top bar'.

CVE-2013-7143 open-xchange vulnerability CVSS: 4.3 26 Jan 2014, 20:55 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite 7.4.1 allows remote attackers to inject arbitrary web script or HTML via the title in a mail filter rule.

CVE-2013-7142 open-xchange vulnerability CVSS: 4.3 26 Jan 2014, 20:55 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite 7.4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified oAuth API functions.

CVE-2013-7141 open-xchange vulnerability CVSS: 4.3 26 Jan 2014, 20:55 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite 7.4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to crafted "<%" tags.

CVE-2013-7140 open-xchange vulnerability CVSS: 4.0 26 Jan 2014, 20:55 UTC

XML External Entity (XXE) vulnerability in the CalDAV interface in Open-Xchange (OX) AppSuite 7.4.1 and earlier allows remote authenticated users to read portions of arbitrary files via vectors related to the SAX builder and the WebDAV interface. NOTE: this issue has been labeled as both absolute path traversal and XXE, but the root cause may be XXE, since XXE can be exploited to conduct absolute path traversal and other attacks.

CVE-2013-6997 open-xchange vulnerability CVSS: 4.3 09 Jan 2014, 00:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange (OX) AppSuite 7.4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an HTML email with crafted CSS code containing wildcards or (2) office documents containing "crafted hyperlinks with script URL handlers."

CVE-2013-6074 open-xchange vulnerability CVSS: 4.3 20 Nov 2013, 13:19 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange (OX) AppSuite 7.2.x before 7.2.2-rev25 and 7.4.x before 7.4.0-rev14 allows remote attackers to inject arbitrary web script or HTML via an attached SVG file.

CVE-2013-6009 open-xchange vulnerability CVSS: 4.3 03 Oct 2013, 19:55 UTC

CRLF injection vulnerability in Open-Xchange AppSuite before 7.2.2, when using AJP in certain conditions, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the ajax/defer servlet.

CVE-2013-5690 open-xchange vulnerability CVSS: 3.5 03 Oct 2013, 19:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite before 7.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) content with the text/xml MIME type or (2) the Status comment field of an appointment.

CVE-2013-5936 open-xchange vulnerability CVSS: 4.3 25 Sep 2013, 10:31 UTC

The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 allows remote attackers to obtain sensitive information about (1) runtime activity, (2) network configuration, (3) user sessions, (4) the memcache interface, and (5) the REST interface via API calls such as a hazelcast/rest/cluster/ call, a different vulnerability than CVE-2013-5200.

CVE-2013-5935 open-xchange vulnerability CVSS: 4.3 25 Sep 2013, 10:31 UTC

The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 does not properly restrict the set of network interfaces that can receive API calls, which makes it easier for remote attackers to obtain access by sending network traffic from an unintended location, a different vulnerability than CVE-2013-5200.

CVE-2013-5934 open-xchange vulnerability CVSS: 4.0 25 Sep 2013, 10:31 UTC

Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 has a hardcoded password for node join operations, which allows remote attackers to expand a cluster by finding this password in the source code and then sending the password in a Hazelcast cluster API call, a different vulnerability than CVE-2013-5200.

CVE-2013-5200 open-xchange vulnerability CVSS: 7.5 25 Sep 2013, 10:31 UTC

The (1) REST and (2) memcache interfaces in the Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 do not require authentication, which allows remote attackers to obtain sensitive information or modify data via an API call.

CVE-2013-5698 open-xchange vulnerability CVSS: 3.5 05 Sep 2013, 11:44 UTC

Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite and Server before 6.22.0 rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allows remote authenticated users to inject arbitrary web script or HTML via a delivery=view action, aka Bug ID 26373, a different vulnerability than CVE-2013-3106.

CVE-2013-5035 open-xchange vulnerability CVSS: 4.9 05 Sep 2013, 11:44 UTC

Multiple race conditions in HtmlCleaner before 2.6, as used in Open-Xchange AppSuite 7.2.2 before rev13 and other products, allow remote authenticated users to read the private e-mail of other persons in opportunistic circumstances by leveraging lack of thread safety and performing a rapid series of (1) mail-sending or (2) draft-saving operations.

CVE-2013-4790 open-xchange vulnerability CVSS: 3.5 05 Sep 2013, 11:44 UTC

Open-Xchange AppSuite before 7.0.2 rev14, 7.2.0 before rev11, 7.2.1 before rev10, and 7.2.2 before rev9 relies on user-supplied data to predict the IMAP server hostname for an external domain name, which allows remote authenticated users to discover e-mail credentials of other users in opportunistic circumstances via a manual-mode association of a personal e-mail address with the hostname of a crafted IMAP server.

CVE-2013-3106 open-xchange vulnerability CVSS: 4.3 05 Sep 2013, 11:44 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite and Server before 6.20.7 rev18, 6.22.0 before rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allow remote attackers to inject arbitrary web script or HTML via (1) embedded VBScript, (2) object/data Base64 content, (3) a Content-Type header, or (4) UTF-16 encoding, aka Bug IDs 25957, 26237, 26243, and 26244.

CVE-2013-2583 open-xchange vulnerability CVSS: 4.3 05 Sep 2013, 11:44 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite and Server before 6.20.7 rev16, 6.22.0 before rev15, 6.22.1 before rev17, 7.0.1 before rev6, and 7.0.2 before rev7 allow remote attackers to inject arbitrary web script or HTML via (1) a javascript: URL, (2) malformed nested SCRIPT elements, (3) a mail signature, or (4) JavaScript code within an image file.

CVE-2013-2582 open-xchange vulnerability CVSS: 5.0 05 Sep 2013, 11:44 UTC

CRLF injection vulnerability in the redirect servlet in Open-Xchange AppSuite and Server before 6.22.0 rev15, 6.22.1 before rev17, 7.0.1 before rev6, and 7.0.2 before rev7 allows remote attackers to inject arbitrary HTTP headers and conduct open redirect attacks by leveraging improper sanitization of whitespace characters.

CVE-2013-1651 open-xchange vulnerability CVSS: 5.8 05 Sep 2013, 11:44 UTC

OXUpdater in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof update servers and install arbitrary software via a crafted certificate.

CVE-2013-1650 open-xchange vulnerability CVSS: 2.1 05 Sep 2013, 11:44 UTC

Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 uses weak permissions (group "other" readable) under opt/open-xchange/etc/, which allows local users to obtain sensitive information via standard filesystem operations.

CVE-2013-1649 open-xchange vulnerability CVSS: 4.3 05 Sep 2013, 11:44 UTC

Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 uses the crypt and SHA-1 algorithms for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.

CVE-2013-1648 open-xchange vulnerability CVSS: 3.5 05 Sep 2013, 11:44 UTC

The Subscriptions feature in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 does not properly validate the publication-source URL, which allows remote authenticated users to trigger arbitrary outbound TCP traffic via a crafted Source field, as demonstrated by (1) an ftp: URL, (2) a gopher: URL, or (3) an http://127.0.0.1/ URL, related to a "Server-side request forging (SSRF)" issue.

CVE-2013-1647 open-xchange vulnerability CVSS: 5.0 05 Sep 2013, 11:44 UTC

Multiple CRLF injection vulnerabilities in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted parameter, as demonstrated by (1) the location parameter to ajax/redirect or (2) multiple infostore URIs.

CVE-2013-1646 open-xchange vulnerability CVSS: 4.3 05 Sep 2013, 11:44 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 allow remote attackers to inject arbitrary web script or HTML via (1) invalid JSON data in a mail-sending POST request, (2) an arbitrary parameter to servlet/TestServlet, (3) a javascript: URL in a standalone-mode action to a UWA module, (4) an infostore attachment, (5) JavaScript code in a contact image, (6) an RSS feed, or (7) a signature.

CVE-2013-1645 open-xchange vulnerability CVSS: 4.0 05 Sep 2013, 11:44 UTC

Directory traversal vulnerability in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the publication template path.

CVE-2006-2738 open-xchange vulnerability CVSS: 7.5 01 Jun 2006, 10:02 UTC

The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed.