Vulnerability Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. API requests can be used to inject, generate and download executable files to the client ("Reflected File Download"). Malicious platform specific (e.g. Microsoft Windows) batch file can be created via a trusted domain without authentication that, if executed by the user, may lead to local code execution.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Xchange | Open-Xchange Appsuite | <= 7.8.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/93460Third Party AdvisoryVDB Entry
- https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3Release NotesVendor Advisory
- http://www.securityfocus.com/bid/93460Third Party AdvisoryVDB Entry
- https://software.open-xchange.com/OX6/6.22/doc/Release_Notes_for_Patch_Release_3Release NotesVendor Advisory
FAQ
What is CVE-2016-6848?
CVE-2016-6848 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. API requests can be used to inject, generate and download executable files to the client ("Reflected File Download"). Malicious ...
How severe is CVE-2016-6848?
CVE-2016-6848 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6848?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Xchange Open-Xchange Appsuite.