7.1
CVE-2023-25818
- EPSS 0.15%
- Veröffentlicht 27.03.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 07:50:15
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Missing brute force protection on password reset token in Nextcloud Server
Missing brute force protection on password reset token
Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability.
Mögliche Gegenmaßnahme
Server: * No workaround available
Enterprise Server: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 21.0.0 < 21.0.9.10
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 22.0.0 < 22.2.10.10
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 23.0.0 < 23.0.12.5
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 24.0.0 < 24.0.10
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.10
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 25.0.0 < 25.0.4
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.4
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemNextcloud
≫
Produkt
Server
Version
>= 24.0.0, < 24.0.10
Version
>= 25.0.0, < 25.0.4
SystemNextcloud
≫
Produkt
Enterprise Server
Version
>= 21.0.0, < 21.0.9.10
Version
>= 22.0.0, < 22.2.10.10
Version
>= 23.0.0, < 23.0.12.5
Version
>= 24.0.0, < 24.0.10
Version
>= 25.0.0, < 25.0.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.35 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
|
| security-advisories@github.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-307 Improper Restriction of Excessive Authentication Attempts
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.