Lucene search

K
nvd[email protected]NVD:CVE-2023-26442
HistoryAug 02, 2023 - 1:15 p.m.

CVE-2023-26442

2023-08-0213:15:10
CWE-918
web.nvd.nist.gov
cacheservice
server-side
request-forgery
sproxyd
http redirects

3.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

3.8 Low

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.5%

In case Cacheservice was configured to use a sproxyd object-storage backend, it would follow HTTP redirects issued by that backend. An attacker with access to a local or restricted network with the capability to intercept and replay HTTP requests to sproxyd (or who is in control of the sproxyd service) could perform a server-side request-forgery attack and make Cacheservice connect to unexpected resources. We have disabled the ability to follow HTTP redirects when connecting to sproxyd resources. No publicly available exploits are known.

Affected configurations

NVD
Node
open-xchangeopen-xchange_appsuite_officeRange<8.11

3.2 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

3.8 Low

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.5%

Related for NVD:CVE-2023-26442