The "OX Chat" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30269 The "OX Chat" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-08-02T11:46:24.657Z

Reserved: 2023-02-22T20:42:56.091Z

Link: CVE-2023-26449

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-02T13:15:11.090

Modified: 2024-11-21T07:51:28.913

Link: CVE-2023-26449

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.