Lucene search

K
nvd[email protected]NVD:CVE-2023-26438
HistoryAug 02, 2023 - 1:15 p.m.

CVE-2023-26438

2023-08-0213:15:10
CWE-918
CWE-367
web.nvd.nist.gov
5
toctou weakness
jdk dns cache
dns cache expiry
configuration injection
restricted network infrastructure

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.6

Confidence

High

EPSS

0.002

Percentile

54.6%

External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS cache expiry correctly were able to inject configuration that would bypass existing network deny-lists. Attackers could exploit this weakness to discover the existence of restricted network infrastructure and service availability. Improvements were made to include deny-lists not only during the check of the provided connection data, but also during use. No publicly available exploits are known.

Affected configurations

Nvd
Node
open-xchangeopen-xchange_appsuite_backendMatch7.10.6
OR
open-xchangeopen-xchange_appsuite_backendMatch8.10.0
VendorProductVersionCPE
open-xchangeopen-xchange_appsuite_backend7.10.6cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:*:*:*:*:*:*:*
open-xchangeopen-xchange_appsuite_backend8.10.0cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:8.10.0:*:*:*:*:*:*:*

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

4.6

Confidence

High

EPSS

0.002

Percentile

54.6%

Related for NVD:CVE-2023-26438