Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-25579
HistoryFeb 22, 2023 - 6:21 p.m.

CVE-2023-25579 Directory traversal in Nextcloud server

2023-02-2218:21:10
CWE-22
GitHub_M
www.cve.org
nextcloud
directory traversal
vulnerability
version 25.0.2
version 24.0.8
version 23.0.12
upgrade

6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

35.7%

Nextcloud server is a self hosted home cloud product. In affected versions the OC\Files\Node\Folder::getFullPath() function was validating and normalizing the string in the wrong order. The function is used in the newFile() and newFolder() items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "< 23.0.12",
        "status": "affected"
      },
      {
        "version": ">= 24.0.0, < 24.0.8",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0, < 25.0.2",
        "status": "affected"
      }
    ]
  }
]

6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

35.7%

Related for CVELIST:CVE-2023-25579