Lucene search

K
nextcloudNextcloudGHSA-QPHH-6XH7-VFFG
HistoryJun 22, 2023 - 6:14 a.m.

Brute force protection allows to send more requests than intended

2023-06-2206:14:26
github.com
10
brute force protection
excessive requests
configured limits
upgrade
no workaround

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

47.9%

Description

Impact

When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response is sent to the client. This allowed to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit (default 8).

Patches

It is recommended that the Nextcloud Server is upgraded to 25.0.7 or 26.0.2
It is recommended that the Nextcloud Enterprise Server is upgraded to 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 or 26.0.2

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
serverlt25.0.0
serverlt26.0.0

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

47.9%

Related for GHSA-QPHH-6XH7-VFFG