Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-35928
HistoryJun 23, 2023 - 8:58 p.m.

CVE-2023-35928 Nextcloud user scoped external storage can be used to gather credentials of other users

2023-06-2320:58:33
CWE-274
GitHub_M
www.cve.org
nextcloud
data storage
vulnerability
patched
external storage
credentials gathering
user scoped
workaround
app files_external
configuration setting
administration

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.6%

Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2.

Three workarounds are available. Disable app files_external. Change config setting “Allow users to mount external storage” to disabled in “Administration” > “External storage” settings …/index.php/settings/admin/externalstorages. Change config setting to disallow users to create external storages in “Administration” > “External storage” settings …/index.php/settings/admin/externalstorages with the types FTP, Nextcloud, SFTP, and/or WebDAV.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "Nextcloud Enterprise Server >= 19.0.0, < 19.0.13.9",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 20.0.0.0, < 20.0.14.14",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 21.0.0.0, < 21.0.9.12",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 22.0.0.0, < 22.2.10.12",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 23.0.0.0, < 23.0.12.7",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 24.0.0.0, < 24.0.12.2",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 ",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 26.0.0, < 26.0.2",
        "status": "affected"
      },
      {
        "version": "Nextcloud Server >= 25.0.0, < 25.0.7",
        "status": "affected"
      },
      {
        "version": "Nextcloud Server >= 26.0.0, < 26.0.2",
        "status": "affected"
      }
    ]
  }
]

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

64.6%