Description
IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.

Published: 2023-06-20
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-30251 IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with access to user accounts could use this to bypass existing deny-list functionality and trigger requests to restricted network infrastructure to gain insight about topology and running services. We now respect possible IPV4-mapped IPv6 addresses when checking if contained in a deny-list. No publicly available exploits are known.
History

No history.

Subscriptions

Open-xchange Open-xchange Appsuite Backend
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2024-08-02T11:46:24.651Z

Reserved: 2023-02-22T20:42:56.089Z

Link: CVE-2023-26431

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-20T08:15:09.297

Modified: 2024-11-21T07:51:25.743

Link: CVE-2023-26431

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses