7.8

CVE-2023-25820

Nextcloud Server and Enterprise Server missing brute force protection on password confirmation modal

Missing brute force protection on password confirmation modal

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.
Mögliche Gegenmaßnahme
Server: * No workaround available
Enterprise Server: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEditionenterprise Version >= 21.0.0 < 21.0.9
NextcloudNextcloud Server SwEditionenterprise Version >= 22.2.0 < 22.2.10.10
NextcloudNextcloud Server SwEditionenterprise Version >= 23.0.0 < 23.0.12.5
NextcloudNextcloud Server Version >= 24.0.0 < 24.0.10
NextcloudNextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.10
NextcloudNextcloud Server Version >= 25.0.0 < 25.0.4
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.4
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemNextcloud
Produkt Server
Version >= 24.0.0, < 24.0.10
Version >= 25.0.0, < 25.0.4
SystemNextcloud
Produkt Enterprise Server
Version >= 21.0.0, < 21.0.9.10
Version >= 22.0.0, < 22.2.10.10
Version >= 23.0.0, < 23.0.12.5
Version >= 24.0.0, < 24.0.10
Version >= 25.0.0, < 25.0.4
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.09
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
security-advisories@github.com 4.2 0.8 3.4
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
CWE-307 Improper Restriction of Excessive Authentication Attempts

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.