Vulnerability Description
Group-Office is an enterprise CRM and groupware tool. In affected versions there is full Server-Side Request Forgery (SSRF) vulnerability in the /api/upload.php endpoint. The /api/upload.php endpoint does not filter URLs which allows a malicious user to cause the server to make resource requests to untrusted domains. Note that protocols like file:// can also be used to access the server disk. The request result (on success) can then be retrieved using /api/download.php. This issue has been addressed in versions 6.8.15, 6.7.54, and 6.6.177. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Group-Office | Group Office | >= 6.3.1, < 6.6.177 |
Related Weaknesses (CWE)
References
- https://github.com/Intermesh/groupoffice/commit/99205535e8cec6592fd7f1469837926fPatch
- https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfvExploitVendor Advisory
- https://github.com/Intermesh/groupoffice/commit/99205535e8cec6592fd7f1469837926fPatch
- https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfvExploitVendor Advisory
FAQ
What is CVE-2023-46730?
CVE-2023-46730 is a vulnerability with a CVSS score of 7.4 (HIGH). Group-Office is an enterprise CRM and groupware tool. In affected versions there is full Server-Side Request Forgery (SSRF) vulnerability in the /api/upload.php endpoint. The /api/upload.php endpoint ...
How severe is CVE-2023-46730?
CVE-2023-46730 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46730?
Check the references section above for vendor advisories and patch information. Affected products include: Group-Office Group Office.