Lucene search

K
nextcloudNextcloudGHSA-637G-XP2C-QH5H
HistoryJun 22, 2023 - 1:24 p.m.

User scoped external storage can be used to gather credentials of other users

2023-06-2213:24:37
github.com
15
nextcloud
external storage
credential gathering
user scoped
security patch
hackerone
pullrequest
workaround
nextcloud server
nextcloud enterprise server
user account

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

64.6%

Description

Impact

A user could use this functionality to get access to the login credentials of another user and take over their account.

Patches

It is recommended that the Nextcloud Server is upgraded to 25.0.7 or 26.0.2
It is recommended that the Nextcloud Enterprise Server is upgraded to 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 or 26.0.2

Workarounds

3 Workarounds are available:

  • Disable app files_external
  • Change config setting “Allow users to mount external storage” to disabled in “Administration” > “External storage” settings …/index.php/settings/admin/externalstorages
  • Change config setting to disallow users to create external storages in “Administration” > “External storage” settings …/index.php/settings/admin/externalstorages with the following types:
    • FTP
    • Nextcloud
    • SFTP
    • WebDAV

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
serverlt25.0.0
serverlt26.0.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

64.6%