Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-39963
HistoryAug 10, 2023 - 5:26 p.m.

CVE-2023-39963 Missing password confirmation when creating app passwords

2023-08-1017:26:30
CWE-284
GitHub_M
www.cve.org
nextcloud server
data storage
vulnerability
app passwords
security patch

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

0.001 Low

EPSS

Percentile

19.9%

Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": ">= 20.0.0, < 20.0.14.15",
        "status": "affected"
      },
      {
        "version": ">= 21.0.0, < 21.0.9.13",
        "status": "affected"
      },
      {
        "version": ">= 22.0.0, < 22.2.10.14",
        "status": "affected"
      },
      {
        "version": ">= 23.0.0, < 23.0.12.9",
        "status": "affected"
      },
      {
        "version": ">= 24.0.0, < 24.0.12.5",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0, < 25.0.9",
        "status": "affected"
      },
      {
        "version": ">= 26.0.0, < 26.0.4",
        "status": "affected"
      },
      {
        "version": ">= 27.0.0, < 27.0.1",
        "status": "affected"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

0.001 Low

EPSS

Percentile

19.9%