PT-2023-9220 · Nextcloud+2 · Nextcloud Enterprise Server+3
St0Nzyy
·
Published
2023-12-22
·
Updated
2025-01-24
·
CVE-2023-49791
CVSS v2.0
5.5
Medium
| Vector | AV:N/AC:L/Au:S/C:N/I:P/A:P |
Name of the Vulnerable Software and Affected Versions
Nextcloud Server versions prior to 26.0.9 and 27.1.4
Nextcloud Enterprise Server versions prior to 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4
Description
The issue is related to Nextcloud Server, an open source cloud platform, where an attacker who gains access to an active session of another user can delete and modify workflows by sending calls directly to the
API bypassing the password confirmation shown in the UI. This allows a remote attacker to bypass the authentication process.Recommendations
For Nextcloud Server versions prior to 26.0.9, update to version 26.0.9 or later.
For Nextcloud Server versions prior to 27.1.4, update to version 27.1.4 or later.
For Nextcloud Enterprise Server versions prior to 23.0.12.13, update to version 23.0.12.13 or later.
For Nextcloud Enterprise Server versions prior to 24.0.12.9, update to version 24.0.12.9 or later.
For Nextcloud Enterprise Server versions prior to 25.0.13.4, update to version 25.0.13.4 or later.
For Nextcloud Enterprise Server versions prior to 26.0.9, update to version 26.0.9 or later.
For Nextcloud Enterprise Server versions prior to 27.1.4, update to version 27.1.4 or later.
Exploit
Fix
Improper Access Control
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Alt Linux
Nextcloud Enterprise Server
Nextcloud Server
Red Os