Description
Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.

Published: 2023-08-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30271 Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.
History

No history.

Subscriptions

Open-xchange Open-xchange Appsuite Backend
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-08-02T11:53:52.923Z

Reserved: 2023-02-22T20:42:56.092Z

Link: CVE-2023-26451

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-02T13:15:11.233

Modified: 2024-11-21T07:51:29.260

Link: CVE-2023-26451

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses