Lucene search

K
nextcloudNextcloudGHSA-9V72-9XV5-3P7C
HistoryJun 14, 2024 - 2:26 p.m.

Ability to by-pass second factor

2024-06-1414:26:15
github.com
5
2fa bypass
nextcloud upgrade
security advisory

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Description

Impact

Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials.

Patches

It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4
It is recommended that the Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
serverlt26.0.0
serverlt27.0.0
serverlt28.0.0

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Related for GHSA-9V72-9XV5-3P7C