Lucene search

K
nextcloudNextcloudGHSA-7RF8-PQMJ-RPQV
HistoryOct 16, 2023 - 7:20 a.m.

Password of talk conversations can be bruteforced

2023-10-1607:20:11
github.com
6
brute force
nextcloud talk
upgrade
endpoint validation
hackerone
pullrequest
security advisory.

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

21.4%

Description

Impact

Brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts

Patches

It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
talklt15.0.0
talklt16.0.0
talklt17.0.0

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

21.4%

Related for GHSA-7RF8-PQMJ-RPQV