E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until caches were cleared. Successful exploitation requires good timing and modification of multiple request parameters. Please deploy the provided updates and patch releases. The cache for PDF exports now takes user session information into consideration when performing authorization decisions. No publicly available exploits are known.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Apr 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Open-xchange
Open-xchange ox App Suite |
|
Weaknesses | CWE-384 | |
CPEs | cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:* | |
Vendors & Products |
Open-xchange
Open-xchange ox App Suite |

Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-02-13T17:33:48.706Z
Reserved: 2024-01-12T07:03:12.863Z
Link: CVE-2024-23193

Updated: 2024-08-01T22:59:32.057Z

Status : Analyzed
Published: 2024-05-06T07:15:07.533
Modified: 2025-04-10T18:43:56.177
Link: CVE-2024-23193

No data.