Lucene search

K
nextcloudNextcloudGHSA-XWXX-2752-W3XM
HistoryAug 10, 2023 - 7:19 a.m.

Users can delete external storage mount points

2023-08-1007:19:08
github.com
17
nextcloud
external storage
malicious user
inaccessible
upgrade
workaround
hackerone
pullrequest
security advisories
support ticket

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.9%

Description

Impact

A malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well.

Patches

It is recommended that the Nextcloud Server is upgraded to 25.0.9, 26.0.4 or 27.0.1
It is recommended that the Nextcloud Enterprise Server is upgraded to 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4 or 27.0.1

Workarounds

  • Disable app files_external - Also makes the external storage inaccessible but retains the configurations until a patched version has been deployed

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
serverlt25.0.0
serverlt26.0.0
serverlt27.0.0

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

21.9%