Lucene search

K
hackeroneRullzerH1:1994324
HistoryMay 19, 2023 - 11:22 a.m.

Nextcloud: OAuth2 client_secret stored in plain text in the database

2023-05-1911:22:17
rullzer
hackerone.com
$100
6
nextcloud
oauth2
client_secret
plain text
database
security
vulnerability
bugbounty

AI Score

5.9

Confidence

Low

EPSS

0.001

Percentile

33.8%

If an attacker would obtain a dumb of the database they could read out the OAuth2 client secret trivially.
https://github.com/nextcloud/server/blob/master/apps/oauth2/lib/Controller/OauthApiController.php#L128

While I realise this is a big if it is not that hard to make sure the client secret is stored properly hashed.
Or at the very least make sure it is stored encrypted. (however non recoverable has the preference here I’d say)

Impact

An attacker obtaining the read access to a dump of the database can trivially impersonate any OAuth2 client.

AI Score

5.9

Confidence

Low

EPSS

0.001

Percentile

33.8%