Lucene search

K
nextcloudNextcloudGHSA-MR7Q-XF62-FW54
HistoryMay 24, 2023 - 9:48 a.m.

Basic auth header on WebDAV requests is not brute-force protected

2023-05-2409:48:39
github.com
15
webdav
brute-force protection
nextcloud server
upgrade
non-email usernames

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

35.0%

Description

Impact

Missing brute-force protection on the WebDAV endpoints via the basic auth header allowed to brute-force user credentials when the provided user name was not an email address.

Patches

It is recommended that the Nextcloud Server is upgraded to 24.0.11, 25.0.5 or 26.0.0
It is recommended that the Nextcloud Enterprise Server is upgraded to 23.0.12.6, 24.0.11, 25.0.5 or 26.0.0

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

35.0%

Related for GHSA-MR7Q-XF62-FW54