Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23192: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Open-Xchange GmbH OX App Suite

0
Medium
VulnerabilityCVE-2024-23192cvecve-2024-23192
Published: Mon Apr 08 2024 (04/08/2024, 08:09:13 UTC)
Source: CVE Database V5
Vendor/Project: Open-Xchange GmbH
Product: OX App Suite

Description

RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Potentially malicious attributes now get removed from external RSS content. No publicly available exploits are known.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:42:10 UTC

Technical Analysis

CVE-2024-23192 is a cross-site scripting (XSS) vulnerability identified in the OX App Suite developed by Open-Xchange GmbH. The issue stems from improper neutralization of input during web page generation, specifically in the handling of RSS feeds that contain malicious data- attributes. When a user reads a compromised RSS feed or is lured to a compromised account, these malicious attributes can inject script code into the user's browser session. This injected script can perform unauthorized API requests on behalf of the user or extract sensitive information from the user's account, potentially leading to account compromise or data leakage. The vulnerability requires user interaction (UI:R) but does not require any privileges (PR:N) and can be exploited remotely (AV:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vendor has released patches that sanitize external RSS content by removing potentially malicious attributes, mitigating the risk. No known public exploits exist at this time, but the vulnerability poses a risk to any deployment of OX App Suite that processes external RSS feeds without the patch.

Potential Impact

For European organizations using OX App Suite, this vulnerability could lead to unauthorized access to user accounts and data leakage through malicious script execution in browsers. Attackers could leverage this to perform actions on behalf of users, such as accessing sensitive emails, calendar entries, or other personal information managed within the suite. This can result in privacy violations, intellectual property theft, and potential compliance breaches under regulations like GDPR. The medium severity and requirement for user interaction mean the risk is significant but not critical. However, given the widespread use of OX App Suite in European enterprises and public sector organizations, the impact could be substantial if exploited at scale. Additionally, the cross-site scripting nature could facilitate phishing or social engineering campaigns targeting users to trigger the vulnerability.

Mitigation Recommendations

Organizations should immediately apply the vendor-provided patches and updates that sanitize RSS feed content by removing malicious data- attributes. Beyond patching, administrators should restrict or monitor the use of external RSS feeds within OX App Suite to reduce exposure to untrusted content. Implement Content Security Policy (CSP) headers to limit script execution contexts and reduce the impact of potential XSS attacks. User awareness training should emphasize caution when interacting with unfamiliar RSS feeds or links within the application. Regularly audit and monitor application logs for unusual API requests or account activity that could indicate exploitation attempts. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting OX App Suite. Finally, maintain an up-to-date inventory of affected software versions to ensure timely patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2024-01-12T07:03:12.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a474d6d939959c80223fa

Added to database: 11/4/2025, 6:34:53 PM

Last enriched: 11/4/2025, 9:42:10 PM

Last updated: 11/5/2025, 11:05:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats