cve/2023/CVE-2023-26429.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26429](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26429)
![](https://img.shields.io/static/v1?label=Product&message=OX%20App%20Suite&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%207.10.6-rev39%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brighgreen)
### Description
Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.
### POC
#### Reference
- http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.