[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Open-Xchange Security Advisory 2014-04-08
- To: bugtraq <bugtraq@xxxxxxxxxxxxxxxxx>
- Subject: Open-Xchange Security Advisory 2014-04-08
- From: Martin Braun <martin.braun@xxxxxxxxxxxxxxxx>
- Date: Tue, 8 Apr 2014 10:05:28 +0200 (CEST)
Product: Open-Xchange AppSuite
Vendor: Open-Xchange GmbH
Vulnerability type: Information exposure (CWE-200)
Vulnerable version: 7.4.2 and earlier
Vulnerable component: frontend
Fixed version: 7.4.2-rev13, 7.4.1-rev11, 7.2.2-rev20
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-02-27
Solution date: 2014-03-24
Public disclosure: 2013-04-08
CVE reference: CVE-2014-2391
OX bug reference: 31342
CVSSv2: 3.3
(AV:L/AC:H/Au:M/C:C/I:N/A:N/E:F/RL:W/RC:C/CDP:ND/TD:H/CR:ND/IR:ND/AR:ND)
Vulnerability Details:
When using the password recovery service, e.g. after externally modifying a
users password, the corresponding call contains passwords within a parameter of
a GET request.
Risk:
If attackers could intercept the communication between client and server,
sensitive information is exposed via the request URL. This is possible
regardless if content encryption (e.g. SSL) is used. The other risk is, that
parameters of GET requests may get logged at the providers web server or load
balancer log files. Unauthorised personell could get access to these log files
to gain access to the corresponding account. In this case, the previous
password of the user is transmitted, which does not allow direct access.
However, an attacker could use the old password to spot patterns within a users
password policy - or try using the password at other services.
Solution:
Users should update to the latest patch releases. Providers should apply tight
access controls to log files or temporarily avoid logging this specific request.
Vulnerability type: Information exposure (CWE-200)
Vulnerable version: 7.4.2 and earlier
Vulnerable component: frontend
Fixed version: 7.4.2-rev13, 7.4.1-rev11, 7.2.2-rev20
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-02-27
Solution date: 2014-03-24
Public disclosure: 2013-04-08
CVE reference: CVE-2014-2392
OX bug reference: 31343
CVSSv2: 3.3
(AV:L/AC:H/Au:M/C:C/I:N/A:N/E:F/RL:W/RC:C/CDP:ND/TD:H/CR:ND/IR:ND/AR:ND)
Vulnerability Details:
When using the E-Mail autoconfiguration, the corresponding call contains
passwords within a parameter of a GET request.
Risk:
If attackers could intercept the communication between client and server,
sensitive information is exposed via the request URL. This is possible
regardless if content encryption (e.g. SSL) is used. The other risk is, that
parameters of GET requests may get logged at the providers web server or load
balancer log files. Unauthorised personell could get access to these log files
to gain access to the corresponding account.
Solution:
Users should update to the latest patch releases. Providers should apply tight
access controls to log files or temporarily avoid logging this specific request.
Vulnerability type: Cross Site Scripting (CWE-80)
Vulnerable version: 7.4.1 and 7.4.2
Vulnerable component: frontend
Fixed version: 7.4.2-rev13, 7.4.1-rev11
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2014-03-12
Solution date: 2014-03-24
Public disclosure: 2013-04-08
CVE reference: CVE-2014-2393
OX bug reference: 31547
CVSSv2: 5.7
(AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)
Vulnerability Details:
Script code that gets entered to the name of a file in Drive, gets executed
when attaching that file to an E-Mail from within the composer.
Risk:
Malicious script code can be executed within a users context. This can lead to
session hijacking or triggering unwanted actions via the web interface (sending
mail, deleting data etc.).
Solution:
Users should update to the latest patch releases. Users should avoid accepting
suspicious files. In this case, most operating system deny or automatically
rename such file names so the user or an attacker need to actively rename the
file.