CVE-2024-23193
MEDIUMOpen-xchange OX App Suite < 8.22 - Information Disclosure
Title source: ruleDescription
E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until caches were cleared. Successful exploitation requires good timing and modification of multiple request parameters. Please deploy the provided updates and patch releases. The cache for PDF exports now takes user session information into consideration when performing authorization decisions. No publicly available exploits are known.
References (3)
Scores
CVSS v3
5.3
EPSS
0.0015
EPSS Percentile
34.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-200
CWE-384
Status
published
Products (1)
open-xchange/ox_app_suite
< 8.22
Published
May 06, 2024
Tracked Since
Feb 18, 2026