Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Setting the user's name to JS code makes that code execute when selecting that user's "Templates" folder from OX Documents settings. This requires the folder to be shared to the victim. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
Published: 2016-12-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-7727 An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev8. Setting the user's name to JS code makes that code execute when selecting that user's "Templates" folder from OX Documents settings. This requires the folder to be shared to the victim. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
History

No history.

Subscriptions

Open-xchange Open-xchange Appsuite
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T01:43:38.545Z

Reserved: 2016-08-18T00:00:00.000Z

Link: CVE-2016-6842

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-12-15T06:59:15.270

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-6842

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses