Lucene search

K
nvd[email protected]NVD:CVE-2023-48305
HistoryNov 21, 2023 - 11:15 p.m.

CVE-2023-48305

2023-11-2123:15:07
CWE-312
web.nvd.nist.gov
nextcloud server
user passwords
plaintext
log level
debug
log file leak
patch
workaround
config setting.

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

15.5%

Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users’ passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting loglevel to 1 or higher (should always be higher than 1 in production environments).

Affected configurations

NVD
Node
nextcloudnextcloud_serverRange25.0.025.0.11-
OR
nextcloudnextcloud_serverRange25.0.025.0.11enterprise
OR
nextcloudnextcloud_serverRange26.0.026.0.6-
OR
nextcloudnextcloud_serverRange26.0.026.0.6enterprise
OR
nextcloudnextcloud_serverRange27.0.027.1.0-
OR
nextcloudnextcloud_serverRange27.0.027.1.0enterprise

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

0.0004 Low

EPSS

Percentile

15.5%