3.5
CVSSv2

CVE-2013-1648

Published: 05/09/2013 Updated: 06/09/2013
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 355
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

The Subscriptions feature in Open-Xchange Server prior to 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 does not properly validate the publication-source URL, which allows remote authenticated users to trigger arbitrary outbound TCP traffic via a crafted Source field, as demonstrated by (1) an ftp: URL, (2) a gopher: URL, or (3) an 127.0.0.1/ URL, related to a "Server-side request forging (SSRF)" issue.

Vulnerable Product Search on Vulmon Subscribe to Product

open-xchange open-xchange server 6.22.1

open-xchange open-xchange server 6.22.0

open-xchange open-xchange server 6.20.7

Exploits

Multiple security issues for Open-Xchange Server have been discovered and fixed The vendor has chosen responsible full disclosure to publish security issue details Users of the software have already been provided with patched versions Proof regarding authenticity can be obtained from the published release notes: softwareopen-xchangecom ...
Open-Xchange version 6 suffers from cross site scripting, local file inclusion, HTTP header injection / response splitting, missing SSL enforcement, server-side request forging, insecure password hashing, and file permission vulnerabilities ...