CVE-2023-29048

8.8 HIGH

📋 TL;DR

This vulnerability in OX App Suite's OXMF template parser allows attackers to execute arbitrary system commands with the privileges of the non-privileged runtime user. It affects OX App Suite installations where OXMF templates can be processed, potentially leading to unauthorized access and data modification. The vulnerability has been addressed in recent patches.

💻 Affected Systems

Products:
  • OX App Suite
Versions: Versions before 7.10.6 patch release 6248
Operating Systems: All platforms running OX App Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects OX App Suite installations with OXMF template processing enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain command execution on the server, potentially accessing sensitive data, modifying configurations, or establishing persistence for further attacks.

🟠

Likely Case

Limited command execution leading to information disclosure, privilege escalation attempts, or lateral movement within the environment.

🟢

If Mitigated

With proper network segmentation and least privilege, impact is contained to the affected application server with limited access to sensitive systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

No publicly available exploits known, but technical details are published in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.10.6 patch release 6248

Vendor Advisory: https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0005.json

Restart Required: Yes

Instructions:

1. Download patch release 6248 from Open-Xchange. 2. Apply the patch following vendor documentation. 3. Restart OX App Suite services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable OXMF template processing

all

Temporarily disable OXMF template parsing functionality if immediate patching is not possible.

# Configuration changes required in OX App Suite settings
# Consult vendor documentation for specific configuration parameters

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OX App Suite servers from sensitive systems
  • Apply principle of least privilege to the OX App Suite runtime user account

🔍 How to Verify

Check if Vulnerable:

Check OX App Suite version against affected versions list. Review system logs for unexpected command execution patterns.

Check Version:

# Check OX App Suite version via admin interface or configuration files

Verify Fix Applied:

Verify OX App Suite version is 7.10.6 patch release 6248 or later. Test OXMF template functionality to ensure commands cannot be executed.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected command execution in application logs
  • OXMF template processing errors
  • Unusual system commands from OX App Suite process

Network Indicators:

  • Unusual outbound connections from OX App Suite server
  • Suspicious payloads in OXMF template requests

SIEM Query:

source="ox-appsuite" AND (event_type="command_execution" OR template="OXMF")

🔗 References

📤 Share & Export