Lucene search

K
nextcloudNextcloudGHSA-V243-X6JC-42MP
HistoryMar 27, 2023 - 10:32 a.m.

Missing brute force protection on password reset token

2023-03-2710:32:06
github.com
27
brute force
password reset
nextcloud
upgrade

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

EPSS

0.001

Percentile

28.0%

Description

Impact

A malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token.

Patches

It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4
It is recommended that the Nextcloud Enterprise Server is upgraded to 21.0.9.10 or 22.2.10.10 or 23.0.12.5 or 24.0.10 or 25.0.4

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

EPSS

0.001

Percentile

28.0%

Related for GHSA-V243-X6JC-42MP