An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev5. JavaScript code can be used as part of ical attachments within scheduling E-Mails. This content, for example an appointment's location, will be presented to the user at the E-Mail App, depending on the invitation workflow. This code gets executed within the context of the user's current session. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
Advisories
Source ID Title
EUVD EUVD EUVD-2016-6675 An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev5. JavaScript code can be used as part of ical attachments within scheduling E-Mails. This content, for example an appointment's location, will be presented to the user at the E-Mail App, depending on the invitation workflow. This code gets executed within the context of the user's current session. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T01:08:00.528Z

Reserved: 2016-06-22T00:00:00

Link: CVE-2016-5740

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-12-15T06:59:14.253

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-5740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.