Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2013-1648Improper Input Validation in Server

Severity
3.5LOWNVD
EPSS
0.8%
top 25.80%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 5
Latest updateMay 17

Description

The Subscriptions feature in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 does not properly validate the publication-source URL, which allows remote authenticated users to trigger arbitrary outbound TCP traffic via a crafted Source field, as demonstrated by (1) an ftp: URL, (2) a gopher: URL, or (3) an http://127.0.0.1/ URL, related to a "Server-side request forging (SSRF)" issue.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 6.8 | Impact: 2.9

Affected Packages1 packages

NVDopen-xchange/open-xchange_server6.20.7, 6.22.0, 6.22.1+2

🔴Vulnerability Details

2
GHSA
GHSA-xp73-99p3-8q2g: The Subscriptions feature in Open-Xchange Server before 62022-05-17
CVEList
CVE-2013-1648: The Subscriptions feature in Open-Xchange Server before 62013-09-05

💥Exploits & PoCs

1
Exploit-DB
Open-Xchange Server 6 - Multiple Vulnerabilities2013-03-15
CVE-2013-1648 — Improper Input Validation in Server | cvebase