Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-25579
HistoryFeb 22, 2023 - 6:21 p.m.

CVE-2023-25579 Directory traversal in Nextcloud server

2023-02-2218:21:10
CWE-22
GitHub_M
www.cve.org
3
nextcloud
directory traversal
vulnerability
version 25.0.2
version 24.0.8
version 23.0.12
upgrade

CVSS3

6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

EPSS

0.001

Percentile

39.8%

Nextcloud server is a self hosted home cloud product. In affected versions the OC\Files\Node\Folder::getFullPath() function was validating and normalizing the string in the wrong order. The function is used in the newFile() and newFolder() items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "< 23.0.12",
        "status": "affected"
      },
      {
        "version": ">= 24.0.0, < 24.0.8",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0, < 25.0.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L

EPSS

0.001

Percentile

39.8%

Related for CVELIST:CVE-2023-25579