Lucene search

K
hackeroneRullzerH1:1994324
HistoryMay 19, 2023 - 11:22 a.m.

Nextcloud: OAuth2 client_secret stored in plain text in the database

2023-05-1911:22:17
rullzer
hackerone.com
$100
4
nextcloud
oauth2
client_secret
plain text
database
security
vulnerability
bugbounty

5.9 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

26.0%

If an attacker would obtain a dumb of the database they could read out the OAuth2 client secret trivially.
https://github.com/nextcloud/server/blob/master/apps/oauth2/lib/Controller/OauthApiController.php#L128

While I realise this is a big if it is not that hard to make sure the client secret is stored properly hashed.
Or at the very least make sure it is stored encrypted. (however non recoverable has the preference here I’d say)

Impact

An attacker obtaining the read access to a dump of the database can trivially impersonate any OAuth2 client.

5.9 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

26.0%