lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 6 Nov 2013 09:59:19 +0100 (CET)
From: Martin Braun <martin.braun@...n-xchange.com>
To: bugtraq <bugtraq@...urityfocus.com>
Subject: Open-Xchange Security Advisory 2013-11-06

Product: Open-Xchange AppSuite
Vendor: Open-Xchange GmbH

Internal reference: 29147 (Bug ID)
Vulnerability type:  CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page)
Vulnerable version: prior to 7.4.0
Vulnerable component: backend
Fixed version: 7.2.2-rev25, 7.4.0-rev14
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2013-10-07
Solution date: 2013-10-21
Public disclosure: 2013-11-06
CVE reference: CVE-2013-6074
CVSSv2: 5.7 (AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Embedding Javascript code within a SVG file leads to script execution when opening that attachment. Malicious code may be transported by E-Mail or file uploads by other users. Inline images within mail are not affected.

Risk:
Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.)

Solution:
Users should update to the latest available patch releases. Users should avoid opening E-Mail attachments from untrusted sources.



Internal reference: 29315 (Bug ID)
Vulnerability type: CWE-200 (Information Exposure)
Vulnerable version: prior to 7.4.0
Vulnerable component: backend
Fixed version: 7.2.2-rev25, 7.4.0-rev14
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2013-10-16
Solution date: 2013-10-21
Public disclosure: 2013-11-06
CVE reference: CVE-2013-6241
CVSSv2: 6.2 (AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:U/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Information of contacts (birthday, surname, firstname, displayname) are exposed through the “Birthday” widget using the api/contacts?action=birthdays call. This affects contact information where the birthday date is at the next year and the contact information is stored at the same database schema. Additionally, this is limited to contacts of users that share the same user-id within different contexts. If birthdays are due at the following year, the decision tree uses an incorrect SQL statement that bypasses context isolation.

Risk:
Users from different contexts may gain unauthorized access to a subset of contact data.


Solution:
Users should update to the latest available patch releases.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ