Lucene search

K
nextcloudNextcloudGHSA-8F69-F9JG-4X3V
HistoryNov 21, 2023 - 5:19 a.m.

DNS pin middleware can be tricked into DNS rebinding allowing SSRF

2023-11-2105:19:36
github.com
29
nextcloud
server
enterprise
upgrade
dns rebinding
ssrf
vulnerable
middleware

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

29.9%

Description

Impact

The DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result.

Patches

It is recommended that the Nextcloud Server is upgraded to 25.0.11, 26.0.6 or 27.1.0
It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6 or 27.1.0

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

29.9%