Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-28833
HistoryMar 30, 2023 - 6:49 p.m.

CVE-2023-28833 Unrestricted filenames for logo or favicon as admin in the theming settings in nextcloud server

2023-03-3018:49:38
CWE-22
GitHub_M
www.cve.org
nextcloud
server
unrestricted filenames
logo
favicon
theming
security vulnerability
upgraded recommendation

2.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.5%

Nextcloud server is an open source home cloud implementation. In affected versions admins of a server were able to upload a logo or a favicon and to provided a file name which was not restricted and could overwrite files in the appdata directory. Administrators may have access to overwrite these files by other means but this method could be exploited by tricking an admin into uploading a maliciously named file. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should avoid ingesting logo files from untrusted sources.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "< 24.0.10",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0, < 25.0.4",
        "status": "affected"
      }
    ]
  }
]

2.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.5%