Lucene search

K
nextcloudNextcloudGHSA-PF36-JVPV-4HWQ
HistoryAug 08, 2022 - 6:56 a.m.

Missing rate limit when trying to join a password protected Nextcloud Talk conversation

2022-08-0806:56:21
github.com
15
nextcloud
talk
rate limit
password protection
vulnerability
upgrade
brute force protection

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.002

Percentile

57.8%

Description

Impact

If the conversation is password protected and an attacker got the link/conversation token, they can brute force the password because there is no brute force protection.

Patches

It is recommended that the Nextcloud Talk is upgraded to 12.2.7, 13.0.7 or 14.0.3

Workarounds

No workaround available apart from not having password protected conversations.

References

For more information

If you have any questions or comments about this advisory:

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.002

Percentile

57.8%

Related for GHSA-PF36-JVPV-4HWQ