6.5
CVE-2023-28645
- EPSS 0.2%
- Veröffentlicht 31.03.2023 23:15:07
- Zuletzt bearbeitet 21.11.2024 07:55:43
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Secure view can be bypassed by using internal API endpoint in Nextcloud richdocuments
Secure view can be bypassed by using internal API endpoint
Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud.
Mögliche Gegenmaßnahme
richdocuments: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nextcloud ≫ Richdocuments Version >= 6.0.0 < 6.3.2
Nextcloud ≫ Richdocuments Version >= 7.0.0 < 7.0.2
Weitere Schwachstelleninformationen
SystemNextcloud App
≫
Produkt
richdocuments
Version
>= 6.0.0, < 6.3.2
Version
>= 7.0.0, < 7.0.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.2% | 0.421 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| security-advisories@github.com | 5.7 | 2.1 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.