Lucene search

K
nvd[email protected]NVD:CVE-2023-25579
HistoryFeb 22, 2023 - 7:15 p.m.

CVE-2023-25579

2023-02-2219:15:11
CWE-22
web.nvd.nist.gov
nextcloud
server
vulnerability
validation
file paths
data overwrite
upgrade

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.7%

Nextcloud server is a self hosted home cloud product. In affected versions the OC\Files\Node\Folder::getFullPath() function was validating and normalizing the string in the wrong order. The function is used in the newFile() and newFolder() items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

NVD
Node
nextcloudnextcloud_serverRange<23.0.12
OR
nextcloudnextcloud_serverRange20.0.020.0.14enterprise
OR
nextcloudnextcloud_serverRange21.0.021.0.9enterprise
OR
nextcloudnextcloud_serverRange22.2.022.2.10enterprise
OR
nextcloudnextcloud_serverRange23.0.023.0.12enterprise
OR
nextcloudnextcloud_serverRange24.0.024.0.8
OR
nextcloudnextcloud_serverRange24.0.024.0.8enterprise
OR
nextcloudnextcloud_serverRange25.0.025.0.2
OR
nextcloudnextcloud_serverRange25.0.025.0.2enterprise

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.7%