Lucene search

K
nvd[email protected]NVD:CVE-2023-26436
HistoryJun 20, 2023 - 8:15 a.m.

CVE-2023-26436

2023-06-2008:15:09
CWE-94
CWE-502
web.nvd.nist.gov
cve-2023-26436
api security
java objects injection
deserialization
local network access
arbitrary code execution
request processing
illegal class injection
warning logging
exploit limitation

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.7%

Attackers with access to the “documentconverterws” API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API endpoint is restricted to local networks by default. Arbitrary code could be injected that is being executed when processing the request. A check has been introduced to restrict processing of legal and expected classes for this API. We now log a warning in case there are attempts to inject illegal classes. No publicly available exploits are known.

Affected configurations

NVD
Node
open-xchangeopen-xchange_appsuite_backendRange<7.10.6
OR
open-xchangeopen-xchange_appsuite_backendMatch7.10.6
OR
open-xchangeopen-xchange_appsuite_backendMatch7.10.6revision_39

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.7%

Related for NVD:CVE-2023-26436