Lucene search

K
nextcloudNextcloudGHSA-F962-HW26-G267
HistoryNov 21, 2023 - 5:27 a.m.

Users can make external storage mount points inaccessible for other users

2023-11-2105:27:56
github.com
22
nextcloud
security advisory
external storage
inaccessible
malicious user
patches
workarounds
hackerone
pullrequest
support ticket

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

20.3%

Description

Impact

A malicious user could update any personal or global external storage, making them inaccessible for everyone else as well.

Patches

It is recommended that the Nextcloud Server is upgraded to 25.0.13, 26.0.8 or 27.1.3
It is recommended that the Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8 or 27.1.3

Workarounds

  • Disable app files_external - Also makes the external storage inaccessible but retains the configurations until a patched version has been deployed

References

For more information

If you have any questions or comments about this advisory:

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

20.3%