ALT-PU-2023-7785-2
Closed vulnerabilities
BDU:2023-03598
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным ограничением чрезмерных попыток аутентификации, позволяющая нарушителю скомпрометировать целевую систему
BDU:2023-03776
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным обращением с недостаточными привилегиями, позволяющая нарушителю получить доступ к учетным данным других пользователей.
BDU:2023-05873
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2023-05874
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю изменить пароль пользователя
BDU:2023-05875
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю удалить любое личное или глобальное внешнее хранилище, сделав его недоступным для всех остальных
BDU:2023-05876
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2023-05877
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная с неправильным ограничением чрезмерных попыток аутентификации, позволяющая нарушителю перебрать секретные данные настроенных клиентов OAuth2
BDU:2023-06928
Уязвимость реализации прикладного программного интерфейса WebDAV облачного программного обеспечения для создания и использования хранилища данных Nextcloud, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2023-07158
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud, связанная хранением токенов OAuth2 в открытом виде, позволяющая нарушителю получить доступ к серверу и повысить свои привилегии
BDU:2023-07159
Уязвимость компонента Memcached облачного программного обеспечения для создания и использования хранилища данных Nextcloud, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-32318
Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
Modified: 2024-11-21
CVE-2023-32319
Nextcloud server is an open source personal cloud implementation. Missing brute-force protection on the WebDAV endpoints via the basic auth header allowed to brute-force user credentials when the provided user name was not an email address. Users from version 24.0.0 onward are affected. This issue has been addressed in releases 24.0.11, 25.0.5 and 26.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-11-21
CVE-2023-32320
Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg
- https://github.com/nextcloud/server/pull/38274
- https://hackerone.com/reports/1918525
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg
- https://hackerone.com/reports/1918525
- https://github.com/nextcloud/server/pull/38274
Modified: 2024-11-21
CVE-2023-35171
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4
- https://github.com/nextcloud/server/pull/38194
- https://hackerone.com/reports/1977222
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4
- https://hackerone.com/reports/1977222
- https://github.com/nextcloud/server/pull/38194
Modified: 2024-11-21
CVE-2023-35172
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, an attacker can bruteforce the password reset links. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6
- https://github.com/nextcloud/server/pull/38267
- https://hackerone.com/reports/1987062
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6
- https://hackerone.com/reports/1987062
- https://github.com/nextcloud/server/pull/38267
Modified: 2024-11-21
CVE-2023-35927
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87
- https://github.com/nextcloud/server/pull/38247
- https://github.com/nextcloud/server/pull/38247
- https://hackerone.com/reports/1976754
- https://hackerone.com/reports/1976754
Modified: 2024-11-21
CVE-2023-35928
Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2. Three workarounds are available. Disable app files_external. Change config setting "Allow users to mount external storage" to disabled in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages`. Change config setting to disallow users to create external storages in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages` with the types FTP, Nextcloud, SFTP, and/or WebDAV.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h
- https://github.com/nextcloud/server/pull/38265
- https://github.com/nextcloud/server/pull/38265
- https://hackerone.com/reports/1978882
- https://hackerone.com/reports/1978882
Modified: 2024-11-21
CVE-2023-39952
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/groupfolders/issues/1906
- https://github.com/nextcloud/groupfolders/issues/1906
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq
- https://github.com/nextcloud/server/pull/38890
- https://github.com/nextcloud/server/pull/38890
- https://hackerone.com/reports/1808079
- https://hackerone.com/reports/1808079
Modified: 2024-11-21
CVE-2023-39958
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h
- https://github.com/nextcloud/server/pull/38773
- https://github.com/nextcloud/server/pull/38773
- https://hackerone.com/reports/1258448
- https://hackerone.com/reports/1258448
Modified: 2024-11-21
CVE-2023-39959
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj
- https://github.com/nextcloud/server/pull/38747
- https://github.com/nextcloud/server/pull/38747
- https://hackerone.com/reports/1832126
- https://hackerone.com/reports/1832126
Modified: 2024-11-21
CVE-2023-39960
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9
- https://github.com/nextcloud/server/pull/38046
- https://github.com/nextcloud/server/pull/38046
- https://hackerone.com/reports/1924212
- https://hackerone.com/reports/1924212
Modified: 2024-11-21
CVE-2023-39961
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp
- https://github.com/nextcloud/text/pull/4481
- https://github.com/nextcloud/text/pull/4481
- https://hackerone.com/reports/1965156
- https://hackerone.com/reports/1965156
Modified: 2024-11-21
CVE-2023-39962
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 19.0.0 and prior to versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. As a workaround, disable app files_external. This also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm
- https://github.com/nextcloud/server/pull/39323
- https://github.com/nextcloud/server/pull/39323
- https://hackerone.com/reports/2047168
- https://hackerone.com/reports/2047168
Modified: 2024-11-21
CVE-2023-39963
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5
- https://github.com/nextcloud/server/pull/39416
- https://github.com/nextcloud/server/pull/39416
- https://hackerone.com/reports/2067572
- https://hackerone.com/reports/2067572
Modified: 2024-11-21
CVE-2023-45148
Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\Redis` and install Redis instead of Memcached.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63
- https://github.com/nextcloud/server/pull/40293
- https://github.com/nextcloud/server/pull/40293
- https://hackerone.com/reports/2110945
- https://hackerone.com/reports/2110945
Modified: 2024-11-21
CVE-2023-45151
Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9
- https://github.com/nextcloud/server/pull/38398
- https://github.com/nextcloud/server/pull/38398
- https://hackerone.com/reports/1994324
- https://hackerone.com/reports/1994324
Modified: 2024-11-21
CVE-2023-48239
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267
- https://github.com/nextcloud/server/pull/41123
- https://github.com/nextcloud/server/pull/41123
- https://hackerone.com/reports/2212627
- https://hackerone.com/reports/2212627
Modified: 2024-11-21
CVE-2023-48301
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
- https://github.com/nextcloud/circles/pull/1415
- https://github.com/nextcloud/circles/pull/1415
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6
- https://hackerone.com/reports/2210038
- https://hackerone.com/reports/2210038
Modified: 2024-11-21
CVE-2023-48302
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87
- https://github.com/nextcloud/text/pull/4877
- https://github.com/nextcloud/text/pull/4877
- https://hackerone.com/reports/2211561
- https://hackerone.com/reports/2211561
Modified: 2024-11-21
CVE-2023-48303
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details of user configured external storage. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh
- https://github.com/nextcloud/server/pull/39895
- https://github.com/nextcloud/server/pull/39895
- https://hackerone.com/reports/2107934
- https://hackerone.com/reports/2107934
Modified: 2024-11-21
CVE-2023-48304
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3
- https://github.com/nextcloud/server/pull/40292
- https://github.com/nextcloud/server/pull/40292
- https://hackerone.com/reports/2112973
- https://hackerone.com/reports/2112973
Modified: 2024-11-21
CVE-2023-48305
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr
- https://github.com/nextcloud/server/issues/38461
- https://github.com/nextcloud/server/issues/38461
- https://github.com/nextcloud/server/pull/40013
- https://github.com/nextcloud/server/pull/40013
- https://hackerone.com/reports/2101165
- https://hackerone.com/reports/2101165
Modified: 2024-11-21
CVE-2023-48306
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v
- https://github.com/nextcloud/server/pull/40234
- https://github.com/nextcloud/server/pull/40234
- https://hackerone.com/reports/2115212
- https://hackerone.com/reports/2115212