8.8
CVE-2023-30539
- EPSS 0.41%
- Veröffentlicht 17.04.2023 22:15:10
- Zuletzt bearbeitet 21.11.2024 08:00:22
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Users can set up workflows using restricted and invisible system tags in Nextcloud
Users can set up workflows using restricted and invisible system tags
Nextcloud is a personal home server system. Depending on the set up tags and other workflows this issue can be used to limit access of others or being able to grant them access when there are system tag based files access control or files retention rules. It is recommended that the Nextcloud Server is upgraded to 24.0.11 or 25.0.5, the Nextcloud Enterprise Server to 21.0.9.11, 22.2.10.11, 23.0.12.6, 24.0.11 or 25.0.5, and the Nextcloud Files automated tagging app to 1.11.1, 1.12.1, 1.13.1, 1.14.2, 1.15.3 or 1.16.1. Users unable to upgrade should disable all workflow related apps. Users are advised to upgrade.
Mögliche Gegenmaßnahme
Server: * Disable all workflow related apps
Enterprise Server: * Disable all workflow related apps
Files automated tagging: * Disable all workflow related apps
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nextcloud ≫ Nextcloud Files Automated Tagging Version >= 1.14.0 < 1.14.2
Nextcloud ≫ Nextcloud Files Automated Tagging Version >= 1.15.0 < 1.15.3
Nextcloud ≫ Nextcloud Files Automated Tagging Version1.11.0
Nextcloud ≫ Nextcloud Files Automated Tagging Version1.12.0
Nextcloud ≫ Nextcloud Files Automated Tagging Version1.13.0
Nextcloud ≫ Nextcloud Files Automated Tagging Version1.16.0
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 21.0.0 < 21.0.9.11
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 22.0.0 < 22.2.10.11
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 23.0.0 < 23.0.12.6
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 24.0.0 < 24.0.11
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.11
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 25.0.0 < 25.0.5
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.5
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemNextcloud
≫
Produkt
Server
Version
>= 24.0.0, < 24.0.11
Version
>= 25.0.0, < 25.0.5
SystemNextcloud
≫
Produkt
Enterprise Server
Version
>= 21.0.0, < 21.0.9.11
Version
>= 22.0.0, < 22.2.10.11
Version
>= 23.0.0, < 23.0.12.6
Version
>= 24.0.0, < 24.0.11
Version
>= 25.0.0, < 25.0.5
SystemNextcloud App
≫
Produkt
Files automated tagging
Version
>= 1.11.0, < 1.11.1
Version
>= 1.12.0, < 1.12.1
Version
>= 1.13.0, < 1.13.1
Version
>= 1.14.0, < 1.14.2
Version
>= 1.15.0, < 1.15.3
Version
>= 1.16.0, < 1.16.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.41% | 0.614 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| security-advisories@github.com | 6.5 | 2.3 | 3.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.