CVE-2022-24405

9.8 CRITICAL

📋 TL;DR

CVE-2022-24405 is a critical OS command injection vulnerability in OX App Suite's Documentconverter API that allows attackers to execute arbitrary commands on the server by sending malicious serialized Java objects. This affects all OX App Suite installations up to version 7.10.6. Attackers can achieve remote code execution with high privileges.

💻 Affected Systems

Products:
  • OX App Suite
Versions: All versions through 7.10.6
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the Documentconverter API component which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands as the application user, potentially leading to data theft, lateral movement, or complete server takeover.

🟠

Likely Case

Remote code execution leading to web shell deployment, credential harvesting, and data exfiltration from the OX App Suite environment.

🟢

If Mitigated

Limited impact if network segmentation, strict firewall rules, and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The Documentconverter API is typically exposed to users, making internet-facing instances immediately vulnerable to exploitation.
🏢 Internal Only: HIGH - Even internally hosted instances are vulnerable to authenticated users or attackers who gain initial access to the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to OX App Suite. Public proof-of-concept code is available, making exploitation straightforward for attackers with valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OX App Suite 7.10.7 and later

Vendor Advisory: https://open-xchange.com

Restart Required: Yes

Instructions:

1. Backup your OX App Suite installation and data. 2. Download and install OX App Suite version 7.10.7 or later from the official vendor. 3. Restart all OX App Suite services. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable Documentconverter API

linux

Temporarily disable the vulnerable Documentconverter API endpoint to prevent exploitation while planning for patching.

# Edit OX App Suite configuration to disable Documentconverter API
# Consult OX App Suite documentation for specific configuration changes

Network Access Restrictions

linux

Restrict network access to the OX App Suite Documentconverter API endpoints using firewall rules.

# Example iptables rule to restrict access
iptables -A INPUT -p tcp --dport [OX_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [OX_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to OX App Suite only from trusted networks.
  • Deploy a web application firewall (WAF) with rules specifically blocking OS command injection patterns targeting the Documentconverter API.

🔍 How to Verify

Check if Vulnerable:

Check if your OX App Suite version is 7.10.6 or earlier. The vulnerability affects all versions through 7.10.6.

Check Version:

Check OX App Suite admin interface or configuration files for version information. Typically found in /opt/open-xchange/etc/version.properties or similar location.

Verify Fix Applied:

Verify that OX App Suite has been updated to version 7.10.7 or later and that the Documentconverter API no longer accepts malicious serialized Java objects.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Documentconverter API requests with serialized Java objects
  • Suspicious command execution patterns in system logs
  • Multiple failed authentication attempts followed by Documentconverter API access

Network Indicators:

  • Unusual outbound connections from OX App Suite server
  • Traffic patterns indicating command and control communication
  • Exploitation attempts against Documentconverter API endpoints

SIEM Query:

source="ox-app-suite" AND (uri_path="/documentconverter" OR uri_path CONTAINS "documentconverter") AND (request_body CONTAINS "serialized" OR request_body CONTAINS "java.io")

🔗 References

📤 Share & Export