Lucene search

K
cve[email protected]CVE-2023-48306
HistoryNov 21, 2023 - 11:15 p.m.

CVE-2023-48306

2023-11-2123:15:07
CWE-918
web.nvd.nist.gov
42
nextcloud
server
dns
middleware
vulnerability
ssrf
cve-2023-48306
security
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.

Affected configurations

Vulners
NVD
Node
nextcloudnextcloudRange22.0.022.2.10.16
OR
nextcloudnextcloudRange23.0.023.0.12.11
OR
nextcloudnextcloudRange24.0.024.0.12.7
OR
nextcloudnextcloudRange25.0.025.0.11
OR
nextcloudnextcloudRange26.0.026.0.6
OR
nextcloudnextcloudRange27.0.027.1.0
VendorProductVersionCPE
nextcloudnextcloud*cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*
nextcloudnextcloud*cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*
nextcloudnextcloud*cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*
nextcloudnextcloud*cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*
nextcloudnextcloud*cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*
nextcloudnextcloud*cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": ">= 22.0.0, < 22.2.10.16",
        "status": "affected"
      },
      {
        "version": ">= 23.0.0, < 23.0.12.11",
        "status": "affected"
      },
      {
        "version": ">= 24.0.0, < 24.0.12.7",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0, < 25.0.11",
        "status": "affected"
      },
      {
        "version": ">= 26.0.0, < 26.0.6",
        "status": "affected"
      },
      {
        "version": ">= 27.0.0, < 27.1.0",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%