CVE-2016-5740

MEDIUM

Open-Xchange OX App Suite <7.8.2-rev5 - RCE

Title source: llm

Description

An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev5. JavaScript code can be used as part of ical attachments within scheduling E-Mails. This content, for example an appointment's location, will be presented to the user at the E-Mail App, depending on the invitation workflow. This code gets executed within the context of the user's current session. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).

Exploits (1)

exploitdb WRITEUP
by Jakub A>>oczek · textwebappslinux
https://www.exploit-db.com/exploits/40378

Scores

CVSS v3 6.1
EPSS 0.0086
EPSS Percentile 74.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Classification

CWE
CWE-79
Status published

Affected Products (2)

open-xchange/open-xchange_appsuite < 7.8.2
n/a/n/a

Timeline

Published Dec 15, 2016
Tracked Since Feb 18, 2026