Vulnerability Description
Upsell advertisement information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://documentation.open-xchange.com/appsuite/releases/8.21/
- https://documentation.open-xchange.com/appsuite/releases/8.22/
- https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/ox
- https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_
- http://seclists.org/fulldisclosure/2024/Apr/18
- https://documentation.open-xchange.com/appsuite/releases/8.21/
- https://documentation.open-xchange.com/appsuite/releases/8.22/
- https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2024/ox
- https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_
FAQ
What is CVE-2024-23191?
CVE-2024-23191 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Upsell advertisement information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a us...
How severe is CVE-2024-23191?
CVE-2024-23191 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-23191?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.