E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. We now use safer methods of handling external content when embedding displayname information to the web interface. No publicly available exploits are known.
References
| Link | Resource |
|---|---|
| http://seclists.org/fulldisclosure/2024/May/3 | Mailing List Third Party Advisory |
| https://documentation.open-xchange.com/appsuite/releases/8.22/ | Release Notes |
| https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json | Issue Tracking Vendor Advisory |
| http://seclists.org/fulldisclosure/2024/May/3 | Mailing List Third Party Advisory |
| https://documentation.open-xchange.com/appsuite/releases/8.22/ | Release Notes |
| https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/oxas-adv-2024-0002.json | Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-05-06 07:15
Updated : 2025-03-05 22:11
NVD link : CVE-2024-23186
Mitre link : CVE-2024-23186
CVE.ORG link : CVE-2024-23186
JSON object : View
Products Affected
open-xchange
- ox_app_suite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
