// For flags

CVE-2013-1648

Open-Xchange Server 6 - Multiple Vulnerabilities

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Subscriptions feature in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 does not properly validate the publication-source URL, which allows remote authenticated users to trigger arbitrary outbound TCP traffic via a crafted Source field, as demonstrated by (1) an ftp: URL, (2) a gopher: URL, or (3) an http://127.0.0.1/ URL, related to a "Server-side request forging (SSRF)" issue.

La característica Subscriptions en Open-Xchange Server anterior a 6.20.7 rev14, 6.22.0 anterior a rev13, y 6.22.1 anterior a rev14, no valida adecuadamente la URL de publicación origen, lo que permite a usuarios autenticados remotamente provocar una salida de tráfico TCP arbitraria a través de un campo "Source" manipulado, como se demostró con (1) una ftp: URL, (2) una gopher: URL, o (3) una http://127.0.0.1/ URL, relacionado con un problema de "Server-side request forging (SSRF)".

Open-Xchange version 6 suffers from cross site scripting, local file inclusion, HTTP header injection / response splitting, missing SSL enforcement, server-side request forging, insecure password hashing, and file permission vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-11 CVE Reserved
  • 2013-03-14 CVE Published
  • 2013-03-15 First Exploit
  • 2024-09-16 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Open-xchange
Search vendor "Open-xchange"
Open-xchange Server
Search vendor "Open-xchange" for product "Open-xchange Server"
6.20.7
Search vendor "Open-xchange" for product "Open-xchange Server" and version "6.20.7"
-
Affected
Open-xchange
Search vendor "Open-xchange"
Open-xchange Server
Search vendor "Open-xchange" for product "Open-xchange Server"
6.22.0
Search vendor "Open-xchange" for product "Open-xchange Server" and version "6.22.0"
-
Affected
Open-xchange
Search vendor "Open-xchange"
Open-xchange Server
Search vendor "Open-xchange" for product "Open-xchange Server"
6.22.1
Search vendor "Open-xchange" for product "Open-xchange Server" and version "6.22.1"
-
Affected