8.1

CVE-2023-35927

Nextcloud system addressbooks can be modified by malicious trusted server

System addressbooks can be modified by malicious trusted server

NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again.

Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`.
Mögliche Gegenmaßnahme
Server: * Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing` * Afterwards trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`, see the [Using the occ command](https://docs.nextcloud.com/server/stable/admin_manual/configuration_server/occ_command.html) in our documentation.
Enterprise Server: * Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing` * Afterwards trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`, see the [Using the occ command](https://docs.nextcloud.com/server/stable/admin_manual/configuration_server/occ_command.html) in our documentation.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEditionenterprise Version >= 16.0.0 < 19.0.13.9
NextcloudNextcloud Server SwEditionenterprise Version >= 20.0.0 < 20.0.14.14
NextcloudNextcloud Server SwEditionenterprise Version >= 21.0.0 < 21.0.9.12
NextcloudNextcloud Server SwEditionenterprise Version >= 22.0.0 < 22.2.10.12
NextcloudNextcloud Server SwEditionenterprise Version >= 23.0.0 < 23.0.12.7
NextcloudNextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.12.2
NextcloudNextcloud Server SwEdition- Version >= 25.0.0 < 25.0.7
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.7
NextcloudNextcloud Server SwEdition- Version >= 26.0.0 < 26.0.2
NextcloudNextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.2
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemNextcloud
Produkt Server
Version >= 25.0.0, < 25.0.7
Version >= 26.0.0, < 26.0.2
SystemNextcloud
Produkt Enterprise Server
Version >= 16.0.0, < 19.0.13.9
Version >= 20.0.0, < 20.0.14.14
Version >= 21.0.0, < 21.0.9.12
Version >= 22.0.0, < 22.2.10.12
Version >= 23.0.0, < 23.0.12.7
Version >= 24.0.0, < 24.0.12.2
Version >= 25.0.0, < 25.0.7
Version >= 26.0.0, < 26.0.2
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.22% 0.444
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
security-advisories@github.com 7.6 2.3 4.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.