Lucene search

K
redosRedosROS-20240402-12
HistoryApr 02, 2024 - 12:00 a.m.

ROS-20240402-12

2024-04-0200:00:00
redos.red-soft.ru
26
nextcloud
cloud storage
vulnerability
bypassing
restriction policies
xss
ssrf
unauthorized access
unix
remote attacker
administrator modification

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

29.9%

A vulnerability in Nextcloud cloud storage creation and utilization software
Server is related to the ability to update any personal or global external storage, making it
inaccessible to everyone else. Exploitation of the vulnerability could allow an attacker, acting remotely, to bypass existing restriction policies.
remotely to bypass existing access restriction policies.

Vulnerability in Nextcloud cloud storage creation and utilization software
Server is related to copying HTML code without markup (Ctrl+Shift+V). Exploitation of the vulnerability could
allow an attacker acting remotely to perform cross-site scripting attacks (XSS)

Vulnerability in Nextcloud cloud storage creation and utilization software.
Server is related to insufficient validation of incoming requests. Exploitation of the vulnerability could allow
an attacker acting remotely to perform an SSRF attack

Nextcloud Server cloud storage creation and utilization software vulnerability is related to improper neutralization of incoming requests.
Server is related to improper input neutralization during web page creation. Exploitation
the vulnerability could allow a remote attacker to perform a cross-site scripting attack (XSS).
(XSS)

Vulnerability in cloud-based software for creating and using Nextcloud data storage
Server is related to administrator modification of external storage authentication data configured by a user.
user. Exploitation of the vulnerability could allow an attacker acting remotely to bypass the existing
existing access restriction policies

Vulnerability in cloud software for creating and utilizing Nextcloud storage
Server is related to the ability to enable and disable birthdays for any user on the same server.
on the same server. Exploitation of the vulnerability could allow an attacker, acting remotely, to gain
unauthorized access to protected information

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64nextcloud< 25.0.5-7UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.001

Percentile

29.9%