E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until caches were cleared. Successful exploitation requires good timing and modification of multiple request parameters. Please deploy the provided updates and patch releases. The cache for PDF exports now takes user session information into consideration when performing authorization decisions. No publicly available exploits are known.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-20712 | E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until caches were cleared. Successful exploitation requires good timing and modification of multiple request parameters. Please deploy the provided updates and patch releases. The cache for PDF exports now takes user session information into consideration when performing authorization decisions. No publicly available exploits are known. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 10 Apr 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Open-xchange
Open-xchange ox App Suite |
|
| Weaknesses | CWE-384 | |
| CPEs | cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open-xchange
Open-xchange ox App Suite |
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-02-13T17:33:48.706Z
Reserved: 2024-01-12T07:03:12.863Z
Link: CVE-2024-23193
Updated: 2024-08-01T22:59:32.057Z
Status : Analyzed
Published: 2024-05-06T07:15:07.533
Modified: 2025-04-10T18:43:56.177
Link: CVE-2024-23193
No data.
OpenCVE Enrichment
No data.
EUVD