CVE-2023-26436

7.1 HIGH

📋 TL;DR

CVE-2023-26436 is a Java deserialization vulnerability in OX App Suite's documentconverterws API that allows authenticated attackers on local networks to execute arbitrary code by injecting malicious serialized objects. The vulnerability affects OX App Suite installations with the default configuration. Attackers could achieve remote code execution with the privileges of the application server.

💻 Affected Systems

Products:
  • OX App Suite
Versions: Versions prior to 7.10.6 rev 6219
Operating Systems: All platforms running OX App Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Default configuration restricts API access to local networks only, but internal attackers can still exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution, allowing attackers to install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Privilege escalation and lateral movement within the network by authenticated attackers who gain access to the application server.

🟢

If Mitigated

Limited impact if network segmentation restricts access to the API endpoint and proper input validation is implemented.

🌐 Internet-Facing: LOW - The vulnerable API endpoint is restricted to local networks by default configuration.
🏢 Internal Only: HIGH - Attackers with internal network access can exploit this vulnerability to execute arbitrary code.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Java deserialization attacks and access to the local network. No public exploits are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.10.6 rev 6219

Vendor Advisory: https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0002.json

Restart Required: Yes

Instructions:

1. Update OX App Suite to version 7.10.6 rev 6219 or later. 2. Apply the patch that introduces proper class validation during deserialization. 3. Restart the application server.

🔧 Temporary Workarounds

Network Access Restriction

linux

Implement strict network controls to limit access to the documentconverterws API endpoint to only trusted systems.

iptables -A INPUT -p tcp --dport [API_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [API_PORT] -j DROP

Input Validation Enhancement

all

Implement additional input validation and filtering for serialized objects at the application level.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the OX App Suite server from untrusted networks
  • Deploy a web application firewall (WAF) with rules to detect and block Java deserialization attacks

🔍 How to Verify

Check if Vulnerable:

Check OX App Suite version and compare against vulnerable versions (prior to 7.10.6 rev 6219). Review system logs for warnings about illegal class injection attempts.

Check Version:

Check OX App Suite administration interface or consult documentation for version information specific to your installation.

Verify Fix Applied:

Verify OX App Suite version is 7.10.6 rev 6219 or later. Test that the documentconverterws API properly rejects malicious serialized objects.

📡 Detection & Monitoring

Log Indicators:

  • Warnings about illegal class injection attempts in application logs
  • Unusual Java deserialization errors
  • Suspicious requests to /documentconverterws endpoint

Network Indicators:

  • Unusual traffic patterns to the documentconverterws API endpoint
  • Serialized Java objects in HTTP requests

SIEM Query:

source="ox-app-suite-logs" AND (message="*illegal class*" OR message="*deserialization*" OR uri="/documentconverterws")

🔗 References

📤 Share & Export