fkie_cve-2022-37307
Vulnerability from fkie_nvd
Published
2022-12-26 02:15
Modified
2024-11-21 07:14
Severity ?
Summary
OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://open-xchange.com | Vendor Advisory | |
cve@mitre.org | https://seclists.org/fulldisclosure/2022/Nov/18 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://open-xchange.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/fulldisclosure/2022/Nov/18 | Exploit, Mailing List, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D3B06B3-8919-4D41-87A6-DA39189750B9", "versionEndExcluding": "7.10.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:-:*:*:*:*:*:*", "matchCriteriaId": "FE68F102-2EE1-44FF-A8AB-6F71F62712D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5961:*:*:*:*:*:*", "matchCriteriaId": "4F5923E6-C4C1-492F-A130-65D102F67B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5973:*:*:*:*:*:*", "matchCriteriaId": "D703A274-D197-42B3-9720-70E6CCD9E825", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5976:*:*:*:*:*:*", "matchCriteriaId": "D4D5F145-F2BA-4589-8B9A-B967069EA355", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5982:*:*:*:*:*:*", "matchCriteriaId": "7E3F2F8B-F7C4-4297-B451-CAFFCA860D17", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5989:*:*:*:*:*:*", "matchCriteriaId": "C7CB5AA6-19B9-4D21-A2B6-1523719A2DB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5994:*:*:*:*:*:*", "matchCriteriaId": "3FAD63B8-9158-4552-8987-3A418AC5A3A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6000:*:*:*:*:*:*", "matchCriteriaId": "87793628-6C35-4137-B584-3AE2A8363AEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6003:*:*:*:*:*:*", "matchCriteriaId": "06C14CAB-9C56-48A2-82FA-16110923CC78", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6008:*:*:*:*:*:*", "matchCriteriaId": "2201C280-3674-4FA4-8176-723C175A2469", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6010:*:*:*:*:*:*", "matchCriteriaId": "A3CB3836-AD68-4167-98FD-5B05CC9C92EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6016:*:*:*:*:*:*", "matchCriteriaId": "604CF453-CBBE-4123-B3ED-87A8CBF407DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6020:*:*:*:*:*:*", "matchCriteriaId": "6AF52278-E711-4656-9A1C-0A3A7F3C671F", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6026:*:*:*:*:*:*", "matchCriteriaId": "5DD66203-5C4E-434A-BA84-9F78D9E1F7B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6029:*:*:*:*:*:*", "matchCriteriaId": "8A0D1287-7A32-4F56-97F2-8573F12D8EB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6034:*:*:*:*:*:*", "matchCriteriaId": "69858B8E-E4C7-485C-882A-206E07D7343F", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6035:*:*:*:*:*:*", "matchCriteriaId": "C2B82BFA-39B6-4DC8-B691-3284FDCFA227", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6038:*:*:*:*:*:*", "matchCriteriaId": "FD4E8470-B8CE-4670-8334-86B817180E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6046:*:*:*:*:*:*", "matchCriteriaId": "2276EFC8-B5E6-449F-BDD0-EF2108A4CCAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6051:*:*:*:*:*:*", "matchCriteriaId": "2C8B27BE-651D-4B3A-9413-5ABA8AF2AA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6053:*:*:*:*:*:*", "matchCriteriaId": "41EA5F8E-05B5-4C4A-8853-B6948C358F06", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6060:*:*:*:*:*:*", "matchCriteriaId": "3E1A5843-F09A-4BBE-878D-C967E4061B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6061:*:*:*:*:*:*", "matchCriteriaId": "D579A835-6B7F-4C77-991F-C760CB8D3750", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6066:*:*:*:*:*:*", "matchCriteriaId": "B4935091-B9B4-4EA7-8785-FE4529ACFEBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6068:*:*:*:*:*:*", "matchCriteriaId": "33DAB50E-18A0-43CC-9043-5E2B722F3A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6072:*:*:*:*:*:*", "matchCriteriaId": "0E1E9E82-17E3-4B43-AD5B-BBAD25759950", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6079:*:*:*:*:*:*", "matchCriteriaId": "E73BDC2E-3C39-454F-B929-8BB936F36AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6084:*:*:*:*:*:*", "matchCriteriaId": "C4DF7C74-BD66-41E7-8B47-C700D7BE53E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6092:*:*:*:*:*:*", "matchCriteriaId": "9EA739D6-10BD-48B4-9C30-92BE4381C80C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6101:*:*:*:*:*:*", "matchCriteriaId": "79219E01-26C2-462C-B604-783490F26565", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6111:*:*:*:*:*:*", "matchCriteriaId": "6F121147-1AAB-4123-AFD2-31F39434819F", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6120:*:*:*:*:*:*", "matchCriteriaId": "52B9445C-4B0E-437A-BE3C-DBB8A621D354", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6132:*:*:*:*:*:*", "matchCriteriaId": "979495B8-8BF0-41B0-9BD5-48554A9C8889", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6137:*:*:*:*:*:*", "matchCriteriaId": "A82EF754-CCB7-4A03-8986-42BA76E6A2C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6140:*:*:*:*:*:*", "matchCriteriaId": "F4CAFBCA-BD13-4295-A558-844716BA0C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6149:*:*:*:*:*:*", "matchCriteriaId": "AA61FEDD-5F86-45B8-BC55-BDFD6F10BB4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*", "matchCriteriaId": "A144D75D-60A8-4EE0-813C-F658C626B2AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*", "matchCriteriaId": "2DA66230-DE02-4881-A893-E9E78286B157", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*", "matchCriteriaId": "955F3DFB-6479-4867-B62A-82730DBEB498", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*", "matchCriteriaId": "327D1B56-0D05-4D99-91D4-CC1F0AC32972", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*", "matchCriteriaId": "D0CD0684-C431-47F8-A2F4-1936D5C5A72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*", "matchCriteriaId": "EAA6A4A7-C1EE-4716-9F4D-2FF4C4D5FEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*", "matchCriteriaId": "D0968764-CCEE-47A7-9111-E106D887DA43", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*", "matchCriteriaId": "16589FBB-F0CD-4041-8141-5C89FCCA72AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*", "matchCriteriaId": "3CB877EE-A5FE-4FF7-9D21-5C1CFA7343D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*", "matchCriteriaId": "0DF5FB90-8D6D-4F99-B454-411B1DFFA630", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*", "matchCriteriaId": "F58876B9-6C2E-4048-A793-B441A84E86F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*", "matchCriteriaId": "D5F177CB-CC45-45A0-9D02-C14A13ECC7A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*", "matchCriteriaId": "A89A4192-54E9-4899-8C7B-6C7F7E650D5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*", "matchCriteriaId": "F2DC1357-9CD5-415F-A190-2F3F4498EF96", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*", "matchCriteriaId": "D78ACF64-2802-44DD-AF7A-1BD5EA7F9908", "vulnerable": true }, { "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*", "matchCriteriaId": "E8F675FA-1684-413A-B1BE-1C5434AC2862", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature." }, { "lang": "es", "value": "OX App Suite hasta 7.10.6 permite XSS a trav\u00e9s de XHTML CDATA para un fragmento, como lo demuestra el atributo onerror de un elemento IMG dentro de una firma de correo electr\u00f3nico." } ], "id": "CVE-2022-37307", "lastModified": "2024-11-21T07:14:43.430", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-26T02:15:09.633", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://open-xchange.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/2022/Nov/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://open-xchange.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/fulldisclosure/2022/Nov/18" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.