Логотип exploitDog
product: "nextcloud_server"
Консоль
Логотип exploitDog

exploitDog

product: "nextcloud_server"
Nextcloud Server

Nextcloud Serverнабор клиент-серверных программ для создания и использования хранилища данных.

Релизный цикл, информация об уязвимостях

Продукт: Nextcloud Server
Вендор: nextcloud

График релизов

3132202520262027

Недавние уязвимости Nextcloud Server

Количество 440

nvd логотип

CVE-2023-26482

почти 3 года назад

Nextcloud server is an open source home cloud implementation. In affected versions a missing scope validation allowed users to create workflows which are designed to be only available for administrators. Some workflows are designed to be RCE by invoking defined scripts, in order to generate PDFs, invoking webhooks or running scripts on the server. Due to this combination depending on the available apps the issue can result in a RCE at the end. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should disable app `workflow_scripts` and `workflow_pdf_converter` as a mitigation.

CVSS3: 9
EPSS: Средний
debian логотип

CVE-2023-26482

почти 3 года назад

Nextcloud server is an open source home cloud implementation. In affec ...

CVSS3: 9
EPSS: Средний
nvd логотип

CVE-2023-25817

почти 3 года назад

Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.

CVSS3: 3.5
EPSS: Низкий
debian логотип

CVE-2023-25817

почти 3 года назад

Nextcloud server is an open source, personal cloud implementation. In ...

CVSS3: 3.5
EPSS: Низкий
nvd логотип

CVE-2023-25818

почти 3 года назад

Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-25818

почти 3 года назад

Nextcloud server is an open source, personal cloud implementation. In ...

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-25820

почти 3 года назад

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.

CVSS3: 4.2
EPSS: Низкий
debian логотип

CVE-2023-25820

почти 3 года назад

Nextcloud Server is the file server software for Nextcloud, a self-hos ...

CVSS3: 4.2
EPSS: Низкий
nvd логотип

CVE-2023-25821

почти 3 года назад

Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available.

CVSS3: 5.7
EPSS: Низкий
debian логотип

CVE-2023-25821

почти 3 года назад

Nextcloud is an Open Source private cloud software. Versions 24.0.4 an ...

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2023-26482

Nextcloud server is an open source home cloud implementation. In affected versions a missing scope validation allowed users to create workflows which are designed to be only available for administrators. Some workflows are designed to be RCE by invoking defined scripts, in order to generate PDFs, invoking webhooks or running scripts on the server. Due to this combination depending on the available apps the issue can result in a RCE at the end. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should disable app `workflow_scripts` and `workflow_pdf_converter` as a mitigation.

CVSS3: 9
66%
Средний
почти 3 года назад
debian логотип
CVE-2023-26482

Nextcloud server is an open source home cloud implementation. In affec ...

CVSS3: 9
66%
Средний
почти 3 года назад
nvd логотип
CVE-2023-25817

Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.

CVSS3: 3.5
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-25817

Nextcloud server is an open source, personal cloud implementation. In ...

CVSS3: 3.5
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-25818

Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-25818

Nextcloud server is an open source, personal cloud implementation. In ...

CVSS3: 5.3
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-25820

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.

CVSS3: 4.2
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-25820

Nextcloud Server is the file server software for Nextcloud, a self-hos ...

CVSS3: 4.2
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-25821

Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available.

CVSS3: 5.7
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-25821

Nextcloud is an Open Source private cloud software. Versions 24.0.4 an ...

CVSS3: 5.7
0%
Низкий
почти 3 года назад

Уязвимостей на страницу


Поделиться