Description
Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30276 | Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known. |
References
History
Tue, 03 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-12-03T14:35:08.177Z
Reserved: 2023-02-22T20:42:56.092Z
Link: CVE-2023-26456
Updated: 2024-08-02T11:53:52.697Z
Status : Modified
Published: 2023-11-02T14:15:10.940
Modified: 2024-11-21T07:51:30.270
Link: CVE-2023-26456
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD