Lucene search

K
nextcloudNextcloudGHSA-MQRX-GRP7-244M
HistoryFeb 13, 2023 - 1:48 p.m.

SSRF via filter bypass due to lax checking on IPs

2023-02-1313:48:01
github.com
19
ssrf
filter bypass
ip filtering
nextcloud
aws
metadata
hackerone
pullrequest
upgrade
support ticket

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

42.0%

Description

Impact

Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF. An example can be using ⑯⑨。②⑤④。⑯⑨。②⑤④ which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. The above payload will resolve to the magic IP of AWS namely 169.254.169.254 but bypasses all the filtering present in the code itself.

Patches

It is recommended that the Nextcloud Server is upgraded to 24.0.8 or 23.0.12
It is recommended that the Nextcloud Enterprise Server is upgraded to 24.0.8 or 23.0.12

Workarounds

No workaround available

References

For more information

If you have any questions or comments about this advisory:

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

42.0%

Related for GHSA-MQRX-GRP7-244M