Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30276 Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 03 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-12-03T14:35:08.177Z

Reserved: 2023-02-22T20:42:56.092Z

Link: CVE-2023-26456

cve-icon Vulnrichment

Updated: 2024-08-02T11:53:52.697Z

cve-icon NVD

Status : Modified

Published: 2023-11-02T14:15:10.940

Modified: 2024-11-21T07:51:30.270

Link: CVE-2023-26456

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.