CVE-2022-23100

9.8 CRITICAL

📋 TL;DR

CVE-2022-23100 is a critical OS command injection vulnerability in OX App Suite's Documentconverter component that allows attackers to execute arbitrary operating system commands on the server. This affects OX App Suite installations up to version 7.10.6 when processing email attachments or other documents. Organizations using vulnerable versions of OX App Suite for email and collaboration are at risk.

💻 Affected Systems

Products:
  • OX App Suite
Versions: Up to and including 7.10.6
Operating Systems: Linux (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Documentconverter component which processes email attachments and other documents. All installations using affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing complete control over the affected system, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to data theft, service disruption, and potential ransomware deployment on vulnerable servers.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal privileges, and security controls preventing command execution.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited through email attachments, making internet-facing OX App Suite instances prime targets.
🏢 Internal Only: MEDIUM - Internal users could still exploit the vulnerability, though attack surface is reduced compared to internet exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening/sending email with malicious attachment) but the technical complexity is low once the attack vector is accessed. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.10.7 and later

Vendor Advisory: https://open-xchange.com

Restart Required: Yes

Instructions:

1. Backup your OX App Suite configuration and data. 2. Download and install OX App Suite version 7.10.7 or later from the official vendor. 3. Apply the update following vendor documentation. 4. Restart all OX App Suite services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Documentconverter component

linux

Temporarily disable the vulnerable Documentconverter feature to prevent exploitation while planning patching.

# Edit OX App Suite configuration to disable document conversion
# Consult vendor documentation for specific configuration changes

Attachment filtering

all

Implement email attachment filtering to block potentially malicious document types from reaching the Documentconverter.

# Configure email gateway or OX App Suite to filter attachments
# Block or quarantine suspicious attachment types

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OX App Suite servers from critical infrastructure
  • Deploy application-level firewalls or WAF rules to detect and block command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check OX App Suite version via admin interface or command line. Versions 7.10.6 and earlier are vulnerable.

Check Version:

oxinstaller --version or check OX App Suite admin interface

Verify Fix Applied:

Verify OX App Suite version is 7.10.7 or later and test document conversion functionality works without security issues.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Documentconverter process spawning unexpected child processes
  • Failed document conversion attempts with suspicious parameters

Network Indicators:

  • Unusual outbound connections from OX App Suite server
  • Command and control traffic patterns

SIEM Query:

source="ox-app-suite" AND (process_execution OR command_injection OR documentconverter_error)

🔗 References

📤 Share & Export