ALT-PU-2024-1230-3
Closed vulnerabilities
BDU:2023-07159
Уязвимость компонента Memcached облачного программного обеспечения для создания и использования хранилища данных Nextcloud, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00716
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud Server , связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю осуществить SSRF-атаку
BDU:2024-00717
Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud Server , связанная с незашифрованным хранением критичной информации, позволяющая нарушителю раскрыть пароли произвольных пользователей
Modified: 2024-11-21
CVE-2023-45148
Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\Redis` and install Redis instead of Memcached.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63
- https://github.com/nextcloud/server/pull/40293
- https://github.com/nextcloud/server/pull/40293
- https://hackerone.com/reports/2110945
- https://hackerone.com/reports/2110945
Modified: 2024-11-21
CVE-2023-48239
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267
- https://github.com/nextcloud/server/pull/41123
- https://github.com/nextcloud/server/pull/41123
- https://hackerone.com/reports/2212627
- https://hackerone.com/reports/2212627
Modified: 2024-11-21
CVE-2023-48301
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
- https://github.com/nextcloud/circles/pull/1415
- https://github.com/nextcloud/circles/pull/1415
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6
- https://hackerone.com/reports/2210038
- https://hackerone.com/reports/2210038
Modified: 2024-11-21
CVE-2023-48302
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87
- https://github.com/nextcloud/text/pull/4877
- https://github.com/nextcloud/text/pull/4877
- https://hackerone.com/reports/2211561
- https://hackerone.com/reports/2211561
Modified: 2024-11-21
CVE-2023-48303
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details of user configured external storage. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh
- https://github.com/nextcloud/server/pull/39895
- https://github.com/nextcloud/server/pull/39895
- https://hackerone.com/reports/2107934
- https://hackerone.com/reports/2107934
Modified: 2024-11-21
CVE-2023-48304
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3
- https://github.com/nextcloud/server/pull/40292
- https://github.com/nextcloud/server/pull/40292
- https://hackerone.com/reports/2112973
- https://hackerone.com/reports/2112973
Modified: 2024-11-21
CVE-2023-48305
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr
- https://github.com/nextcloud/server/issues/38461
- https://github.com/nextcloud/server/issues/38461
- https://github.com/nextcloud/server/pull/40013
- https://github.com/nextcloud/server/pull/40013
- https://hackerone.com/reports/2101165
- https://hackerone.com/reports/2101165
Modified: 2024-11-21
CVE-2023-48306
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v
- https://github.com/nextcloud/server/pull/40234
- https://github.com/nextcloud/server/pull/40234
- https://hackerone.com/reports/2115212
- https://hackerone.com/reports/2115212