CVE-2023-26429

Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:*:*:*:*:*:*:*:*
cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:*:*:*:*:*:*:*:*
cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:*:*:*:*:*:*:*
cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:revision_39:*:*:*:*:*:*

History

07 Jul 2023, 18:39

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-20 08:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-26429

Mitre link : CVE-2023-26429

CVE.ORG link : CVE-2023-26429


JSON object : View

Products Affected

open-xchange

  • open-xchange_appsuite_backend
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')