Lucene search

K
nvd[email protected]NVD:CVE-2023-28833
HistoryMar 30, 2023 - 7:15 p.m.

CVE-2023-28833

2023-03-3019:15:06
CWE-22
CWE-434
web.nvd.nist.gov
3
nextcloud server
file upload
unrestricted filenames
file overwrite
upgrade recommended

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.2

Confidence

High

EPSS

0.002

Percentile

53.8%

Nextcloud server is an open source home cloud implementation. In affected versions admins of a server were able to upload a logo or a favicon and to provided a file name which was not restricted and could overwrite files in the appdata directory. Administrators may have access to overwrite these files by other means but this method could be exploited by tricking an admin into uploading a maliciously named file. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should avoid ingesting logo files from untrusted sources.

Affected configurations

Nvd
Node
nextcloudnextcloud_serverRange23.0.023.0.14enterprise
OR
nextcloudnextcloud_serverRange24.0.024.0.10-
OR
nextcloudnextcloud_serverRange24.0.024.0.10enterprise
OR
nextcloudnextcloud_serverRange25.0.025.0.4-
OR
nextcloudnextcloud_serverRange25.0.025.0.4enterprise
VendorProductVersionCPE
nextcloudnextcloud_server*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
nextcloudnextcloud_server*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.2

Confidence

High

EPSS

0.002

Percentile

53.8%