Vulnerability Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Script code within SVG files is maintained when opening such files "in browser" based on our Mail or Drive app. In case of "a" tags, this may include link targets with base64 encoded "data" references. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Xchange | Open-Xchange Appsuite | <= 7.8.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/93457Third Party AdvisoryVDB Entry
- https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3Release NotesVendor Advisory
- http://www.securityfocus.com/bid/93457Third Party AdvisoryVDB Entry
- https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3Release NotesVendor Advisory
FAQ
What is CVE-2016-6844?
CVE-2016-6844 is a vulnerability with a CVSS score of 6.1 (MEDIUM). An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Script code within SVG files is maintained when opening such files "in browser" based on our Mail or Drive app. In case of "a" t...
How severe is CVE-2016-6844?
CVE-2016-6844 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6844?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Xchange Open-Xchange Appsuite.