Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-28833
HistoryMar 30, 2023 - 6:49 p.m.

CVE-2023-28833 Unrestricted filenames for logo or favicon as admin in the theming settings in nextcloud server

2023-03-3018:49:38
CWE-22
GitHub_M
www.cve.org
4
nextcloud
server
unrestricted filenames
logo
favicon
theming
security vulnerability
upgraded recommendation

CVSS3

2.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L

AI Score

8.9

Confidence

High

EPSS

0.002

Percentile

53.8%

Nextcloud server is an open source home cloud implementation. In affected versions admins of a server were able to upload a logo or a favicon and to provided a file name which was not restricted and could overwrite files in the appdata directory. Administrators may have access to overwrite these files by other means but this method could be exploited by tricking an admin into uploading a maliciously named file. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should avoid ingesting logo files from untrusted sources.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "< 24.0.10",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0, < 25.0.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

2.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L

AI Score

8.9

Confidence

High

EPSS

0.002

Percentile

53.8%