ALT-PU-2023-2009-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-32318
Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
Modified: 2024-11-21
CVE-2023-32320
Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg
- https://github.com/nextcloud/server/pull/38274
- https://hackerone.com/reports/1918525
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg
- https://hackerone.com/reports/1918525
- https://github.com/nextcloud/server/pull/38274