7.2

CVE-2023-32318

User session not correctly destroyed on logout

User session not correctly destroyed on logout

Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
Mögliche Gegenmaßnahme
Server: * Disable the Nextcloud Text app
Enterprise Server: * Disable the Nextcloud Text app
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEdition- Version >= 25.0.2 < 25.0.6
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.2 < 25.0.6
NextcloudNextcloud Server Version26.0.0 SwEdition-
NextcloudNextcloud Server Version26.0.0 SwEditionenterprise
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemNextcloud
Produkt Server
Version >= 25.0.2, < 25.0.6
Version >= 26.0.0, < 26.0.1
SystemNextcloud
Produkt Enterprise Server
Version >= 25.0.2, < 25.0.6
Version >= 26.0.0, < 26.0.1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.213
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
security-advisories@github.com 7.2 0.8 5.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."