CVE-2023-25818 – Missing brute force protection on password reset token in Nextcloud Server
https://notcve.org/view.php?id=CVE-2023-25818
Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp https://github.com/nextcloud/server/pull/36489 https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3 • CWE-307: Improper Restriction of Excessive Authentication Attempts •
CVE-2023-25820 – Nextcloud Server and Enterprise Server missing brute force protection on password confirmation modal
https://notcve.org/view.php?id=CVE-2023-25820
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x https://github.com/nextcloud/server/pull/36489 https://hackerone.com/reports/1842114 • CWE-307: Improper Restriction of Excessive Authentication Attempts •
CVE-2023-25816 – nextcloud vulnerable to Uncontrolled Resource Consumption
https://notcve.org/view.php?id=CVE-2023-25816
Nextcloud is an Open Source private cloud software. Versions 25.0.0 and above, prior to 25.0.3, are subject to Uncontrolled Resource Consumption. A user can configure a very long password, consuming more resources on password validation than desired. This issue is patched in 25.0.3 No workaround is available. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83 https://github.com/nextcloud/server/pull/35965 https://hackerone.com/reports/1820864 • CWE-400: Uncontrolled Resource Consumption •
CVE-2023-25579 – Directory traversal in Nextcloud server
https://notcve.org/view.php?id=CVE-2023-25579
Nextcloud server is a self hosted home cloud product. In affected versions the `OC\Files\Node\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v https://github.com/nextcloud/server/pull/35074 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •