435
VMScore

CVE-2016-6851

Published: 15/12/2016 Updated: 19/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in Open-Xchange OX Guard prior to 2.4.2-rev5. Script code can be provided as parameter to the OX Guard guest reader web application. This allows cross-site scripting attacks against arbitrary users since no prior authentication is needed. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.) in case the user has an active session on the same domain already.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

open-xchange ox guard

Exploits

Product: OX Guard Vendor: OX Software GmbH Internal reference: 47878 (Bug ID) Vulnerability type: Cross Site Scripting (CWE-80) Vulnerable version: 242 and earlier Vulnerable component: guard Report confidence: Confirmed Solution status: Fixed by Vendor Fixed version: 240-rev11, 242-rev5 Researcher credits: Benjamin Daniel Mussler (@dejavuln ...
Open-Xchange Guard versions 242 and below suffer from multiple cross site scripting vulnerabilities ...