CVE-2023-26454

7.6 HIGH

📋 TL;DR

This SQL injection vulnerability in the imageconverter service allows attackers with adjacent network access to execute arbitrary SQL queries. It affects Open-Xchange AppSuite installations where the vulnerable service is exposed. Successful exploitation could lead to database compromise and data manipulation.

💻 Affected Systems

Products:
  • Open-Xchange AppSuite
Versions: Versions before patch release 6243 (7.10.6)
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if imageconverter service is exposed beyond default configuration; requires adjacent network access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, modification, or deletion; potential privilege escalation within the database context.

🟠

Likely Case

Data leakage from the imageconverter service database, potential service disruption, and unauthorized data access.

🟢

If Mitigated

Limited impact due to network segmentation and proper input validation; failed exploitation attempts logged for monitoring.

🌐 Internet-Facing: LOW (service not exposed to public networks by default)
🏢 Internal Only: MEDIUM (requires adjacent network access, but internal attackers could exploit)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires adjacent network access to imageconverter service; SQL injection via image metadata requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patch release 6243 (7.10.6)

Vendor Advisory: https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0004.json

Restart Required: Yes

Instructions:

1. Download patch release 6243 from Open-Xchange. 2. Apply the patch following vendor documentation. 3. Restart affected services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to imageconverter service to only necessary networks

# Example firewall rule (adjust for your environment)
iptables -A INPUT -p tcp --dport [imageconverter_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [imageconverter_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit imageconverter service exposure
  • Enable detailed logging and monitoring for SQL injection attempts in image metadata requests

🔍 How to Verify

Check if Vulnerable:

Check AppSuite version: if before 7.10.6 patch 6243 and imageconverter service is exposed, system is vulnerable.

Check Version:

Check Open-Xchange AppSuite version through admin interface or configuration files per vendor documentation.

Verify Fix Applied:

Verify version is 7.10.6 with patch 6243 applied and test that SQL injection attempts in image metadata are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in imageconverter logs
  • Unusual database queries from imageconverter service
  • Failed authentication attempts to image metadata endpoints

Network Indicators:

  • Unusual SQL patterns in HTTP requests to imageconverter endpoints
  • Multiple failed requests to image metadata API

SIEM Query:

source="imageconverter.log" AND ("SQL" OR "syntax" OR "error")

🔗 References

📤 Share & Export