CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
42.0%
Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF. An example can be using ⑯⑨。②⑤④。⑯⑨。②⑤④ which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. The above payload will resolve to the magic IP of AWS namely 169.254.169.254 but bypasses all the filtering present in the code itself.
It is recommended that the Nextcloud Server is upgraded to 24.0.8 or 23.0.12
It is recommended that the Nextcloud Enterprise Server is upgraded to 24.0.8 or 23.0.12
No workaround available
If you have any questions or comments about this advisory: