Lucene search

K
cveGitHub_MCVE-2023-35927
HistoryJun 23, 2023 - 9:15 p.m.

CVE-2023-35927

2023-06-2321:15:09
CWE-284
GitHub_M
web.nvd.nist.gov
30
nextcloud
nextcloud server
nextcloud enterprise server
file storage
productivity platform
cve-2023-35927
security vulnerability
vcards
addressbook
user search
server trust
nvd.

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

49.7%

NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again.

Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the “Administration” > “Sharing” settings …/index.php/settings/admin/sharing. Afterwards, trigger a recreation of the local system addressbook with the following occ dav:sync-system-addressbook.

Affected configurations

Nvd
Vulners
Node
nextcloudnextcloud_serverRange16.0.019.0.13.9enterprise
OR
nextcloudnextcloud_serverRange20.0.020.0.14.14enterprise
OR
nextcloudnextcloud_serverRange21.0.021.0.9.12enterprise
OR
nextcloudnextcloud_serverRange22.0.022.2.10.12enterprise
OR
nextcloudnextcloud_serverRange23.0.023.0.12.7enterprise
OR
nextcloudnextcloud_serverRange24.0.024.0.12.2enterprise
OR
nextcloudnextcloud_serverRange25.0.025.0.7-
OR
nextcloudnextcloud_serverRange25.0.025.0.7enterprise
OR
nextcloudnextcloud_serverRange26.0.026.0.2-
OR
nextcloudnextcloud_serverRange26.0.026.0.2enterprise
VendorProductVersionCPE
nextcloudnextcloud_server*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
nextcloudnextcloud_server*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "Nextcloud Server >= 25.0.0, < 25.0.7",
        "status": "affected"
      },
      {
        "version": "Nextcloud Server >= 26.0.0, < 26.0.2",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 25.0.0, < 25.0.7",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 26.0.0, < 26.0.2",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7",
        "status": "affected"
      },
      {
        "version": "Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

49.7%