Lucene search

K
nextcloudNextcloudGHSA-5W64-6C42-RGCV
HistoryApr 03, 2023 - 12:59 p.m.

Full path of data directory exposed to users

2023-04-0312:59:05
github.com
11
nextcloud
data directory path
api endpoint
security patch
hackerone
pullrequest
public ticket

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

31.1%

Description

Impact

A user was able to get the full data directory path of the Nextcloud server from an API endpoint. By itself this information is not problematic as it can also be guessed for most common setups, but it could speed up other unknown attacks in the future if the information is known.

Patches

It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6
It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
serverlt24.0.0
serverlt25.0.0

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

31.1%

Related for GHSA-5W64-6C42-RGCV