CVE-2023-26451

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to predict authorization tokens in OX App Suite's oAuth Authorization Service, enabling them to intercept and hijack client authorization processes. This could lead to account compromise of other users. Only systems with the oAuth Authorization Service enabled are affected, which is not the default configuration.

💻 Affected Systems

Products:
  • OX App Suite
Versions: Versions before 7.10.6 patch release 6230 (2023-05-02)
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when oAuth Authorization Service is explicitly enabled, which is not the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could compromise user accounts, access sensitive data, and perform unauthorized actions as legitimate users.

🟠

Likely Case

Targeted account takeover of users who have interacted with the vulnerable oAuth service.

🟢

If Mitigated

Limited impact if service is disabled or patched, with only authorization process interception possible.

🌐 Internet-Facing: HIGH if oAuth service is enabled and exposed to internet, as predictable tokens enable remote exploitation.
🏢 Internal Only: MEDIUM if service is enabled internally only, requiring internal network access but still allowing account compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No publicly available exploits known, but predictable tokens make exploitation straightforward if service is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.10.6 patch release 6230 (2023-05-02)

Vendor Advisory: https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0003.json

Restart Required: Yes

Instructions:

1. Update OX App Suite to version 7.10.6 patch release 6230 or later. 2. Apply the patch from the vendor advisory. 3. Restart the OX App Suite services.

🔧 Temporary Workarounds

Disable oAuth Authorization Service

all

Disable the vulnerable oAuth Authorization Service if not required.

# Edit OX App Suite configuration to disable oAuth service
# Consult OX App Suite documentation for specific configuration steps

🧯 If You Can't Patch

  • Disable the oAuth Authorization Service immediately if not essential for operations.
  • Implement network segmentation to restrict access to the oAuth service only to trusted clients.

🔍 How to Verify

Check if Vulnerable:

Check if OX App Suite version is before 7.10.6 patch release 6230 and if oAuth Authorization Service is enabled in configuration.

Check Version:

# Check OX App Suite version via admin interface or configuration files

Verify Fix Applied:

Verify OX App Suite version is 7.10.6 patch release 6230 or later and confirm oAuth service uses secure random token generation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authorization token patterns
  • Multiple failed or successful oAuth authorization attempts from single source

Network Indicators:

  • Predictable authorization tokens in oAuth traffic
  • Unexpected oAuth authorization requests

SIEM Query:

Example: oAuth authorization events with token patterns matching predictable sequences

🔗 References

📤 Share & Export