ALT-PU-2023-2213-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-39329
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 23.0.9 and 24.0.5 are vulnerable to exposure of information that cannot be controlled by administrators without direct database access. Versions 23.0.9 and 24.0.5 contains patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f3p-rcm5-mrg3
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f3p-rcm5-mrg3
- https://github.com/nextcloud/server/pull/33643
- https://github.com/nextcloud/server/pull/33643
- https://hackerone.com/reports/1675014
- https://hackerone.com/reports/1675014
Modified: 2024-11-21
CVE-2022-39330
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server prior to versions 22.2.10, 23.0.10, and 24.0.6 are vulnerable to a logged-in attacker slowing down the system by generating a lot of database/cpu load. Nextcloud Server versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server versions 22.2.10, 23.0.10, and 24.0.6 contain patches for this issue. As a workaround, disable the Circles app.
- https://github.com/nextcloud/circles/pull/1147
- https://github.com/nextcloud/circles/pull/1147
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wxx7-w5p4-7x4c
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wxx7-w5p4-7x4c
- https://hackerone.com/reports/1688199
- https://hackerone.com/reports/1688199
Modified: 2024-11-21
CVE-2022-39364
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a SharePoint service. Nextcloud Server versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server versions 22.2.10.5, 23.0.9, and 24.0.5 contain a patch for this issue. As a workaround, set `zend.exception_ignore_args = On` as an option in `php.ini`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5
- https://github.com/nextcloud/server/pull/33689
- https://github.com/nextcloud/server/pull/33689
- https://github.com/nextcloud/sharepoint/issues/141
- https://github.com/nextcloud/sharepoint/issues/141
- https://hackerone.com/reports/1652903
- https://hackerone.com/reports/1652903
Modified: 2024-11-21
CVE-2022-41968
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.10 and 24.0.5, calendar name lengths are not validated before writing to a database. As a result, an attacker can send unnecessary amounts of data against the database. Version 23.0.10 and 24.0.5 contain patches for the issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v
- https://github.com/nextcloud/server/pull/33139
- https://github.com/nextcloud/server/pull/33139
- https://hackerone.com/reports/1596148
- https://hackerone.com/reports/1596148
Modified: 2024-11-21
CVE-2022-41969
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.11, 24.0.7, and 25.0.0, there is no password length limit when creating a user as an administrator. An administrator can cause a limited DoS attack against their own server. Versions 23.0.11, 24.0.7, and 25.0.0 contain a fix for the issue. As a workaround, don't create user accounts with long passwords.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx
- https://github.com/nextcloud/server/pull/34500
- https://github.com/nextcloud/server/pull/34500
- https://hackerone.com/reports/1727424
- https://hackerone.com/reports/1727424
Modified: 2024-11-21
CVE-2023-25162
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to 24.0.8 and 23.0.12 and Nextcloud Enterprise server prior to 24.0.8 and 23.0.12 are vulnerable to server-side request forgery (SSRF). Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF, which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. Nextcloud Server 24.0.8 and 23.0.2 and Nextcloud Enterprise Server 24.0.8 and 23.0.12 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m
- https://github.com/nextcloud/server/pull/34160
- https://github.com/nextcloud/server/pull/34160
- https://hackerone.com/reports/1702864
- https://hackerone.com/reports/1702864
Modified: 2024-11-21
CVE-2023-25817
Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.