4.3
CVSSv2

CVE-2013-1646

Published: 05/09/2013 Updated: 26/09/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange Server prior to 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 allow remote malicious users to inject arbitrary web script or HTML via (1) invalid JSON data in a mail-sending POST request, (2) an arbitrary parameter to servlet/TestServlet, (3) a javascript: URL in a standalone-mode action to a UWA module, (4) an infostore attachment, (5) JavaScript code in a contact image, (6) an RSS feed, or (7) a signature.

Vulnerable Product Search on Vulmon Subscribe to Product

open-xchange open-xchange server 6.22.1

open-xchange open-xchange server 6.20.7

open-xchange open-xchange server 6.22.0

Exploits

Multiple security issues for Open-Xchange Server have been discovered and fixed The vendor has chosen responsible full disclosure to publish security issue details Users of the software have already been provided with patched versions Proof regarding authenticity can be obtained from the published release notes: softwareopen-xchangecom ...
Open-Xchange version 6 suffers from cross site scripting, local file inclusion, HTTP header injection / response splitting, missing SSL enforcement, server-side request forging, insecure password hashing, and file permission vulnerabilities ...