PT-2023-9220 · Nextcloud+2 · Nextcloud Enterprise Server+3

St0Nzyy

·

Published

2023-12-22

·

Updated

2025-01-24

·

CVE-2023-49791

CVSS v2.0

5.5

Medium

VectorAV:N/AC:L/Au:S/C:N/I:P/A:P
Name of the Vulnerable Software and Affected Versions Nextcloud Server versions prior to 26.0.9 and 27.1.4 Nextcloud Enterprise Server versions prior to 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4
Description The issue is related to Nextcloud Server, an open source cloud platform, where an attacker who gains access to an active session of another user can delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. This allows a remote attacker to bypass the authentication process.
Recommendations For Nextcloud Server versions prior to 26.0.9, update to version 26.0.9 or later. For Nextcloud Server versions prior to 27.1.4, update to version 27.1.4 or later. For Nextcloud Enterprise Server versions prior to 23.0.12.13, update to version 23.0.12.13 or later. For Nextcloud Enterprise Server versions prior to 24.0.12.9, update to version 24.0.12.9 or later. For Nextcloud Enterprise Server versions prior to 25.0.13.4, update to version 25.0.13.4 or later. For Nextcloud Enterprise Server versions prior to 26.0.9, update to version 26.0.9 or later. For Nextcloud Enterprise Server versions prior to 27.1.4, update to version 27.1.4 or later.

Exploit

Fix

Improper Access Control

Improper Authentication

Weakness Enumeration

Related Identifiers

ALT-PU-2024-14145
ALT-PU-2024-14169
ALT-PU-2025-1855
BDU:2024-04875
CVE-2023-49791
GHSA-3F8P-6QWW-2PRR

Affected Products

Alt Linux
Nextcloud Enterprise Server
Nextcloud Server
Red Os