Bug 2255669 (CVE-2023-49791, CVE-2023-49792) - CVE-2023-49792 CVE-2023-49791 nextcloud-server: multiple vulnerabilities
Summary: CVE-2023-49792 CVE-2023-49791 nextcloud-server: multiple vulnerabilities
Keywords:
Status: NEW
Alias: CVE-2023-49791, CVE-2023-49792
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2255670 2255671
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-12-22 21:11 UTC by Patrick Del Bello
Modified: 2023-12-22 21:12 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Patrick Del Bello 2023-12-22 21:11:45 UTC
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.

https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98
https://github.com/nextcloud/server/pull/41526
https://hackerone.com/reports/2230915


Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.

https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr
https://github.com/nextcloud/server/pull/41520
https://hackerone.com/reports/2120667

Comment 1 Patrick Del Bello 2023-12-22 21:12:05 UTC
Created nextcloud tracking bugs for this issue:

Affects: epel-all [bug 2255670]
Affects: fedora-all [bug 2255671]


Note You need to log in before you can comment on or make changes to this bug.