Lucene search

K
redosRedosROS-20230913-02
HistorySep 13, 2023 - 12:00 a.m.

ROS-20230913-02

2023-09-1300:00:00
redos.red-soft.ru
8
nextcloud
server
vulnerability
access control
delete
external storage
password validation
session
dav request
calendar
address book
excessive authentication attempts

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

0.001 Low

EPSS

Percentile

30.6%

Nextcloud server vulnerability is related to improper access control. Exploitation of the vulnerability could
allow an attacker acting remotely to access files within a subfolder of an accessible group folder, even if extended permissions block access to the subfolder.
of a group folder, even if advanced permissions block access to the subfolder.

The Nextcloud server vulnerability is related to improper access control. Exploitation of the vulnerability could
Allow an attacker acting remotely to delete any personal or global external storage,
making it inaccessible to everyone else.

The Nextcloud server vulnerability is related to the lack of password validation for a logged in
user. Exploitation of the vulnerability could allow an attacker acting remotely to successfully
steal a session, then create application passwords for the victim.

Nextcloud server vulnerability is related to improper access control. Exploitation of the vulnerability could
allow an attacker acting remotely to send a DAV request that would reveal whether the
victim has a calendar or address book with a given identifier.

The Nextcloud server vulnerability involves improperly limiting excessive authentication attempts.
Exploitation of the vulnerability could allow an attacker acting remotely to brute force the sensitive data of the
of configured OAuth2 clients.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64nextcloud<= 25.0.5-3UNKNOWN

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

0.001 Low

EPSS

Percentile

30.6%