5.8
CVE-2023-39958
- EPSS 0.44%
- Veröffentlicht 10.08.2023 18:15:09
- Zuletzt bearbeitet 21.11.2024 08:16:07
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Missing brute force protection on password reset token OAuth2 API controller
Missing brute force protection on OAuth2 API controller
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Mögliche Gegenmaßnahme
Server: * No workaround available
Enterprise Server: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 22.0.0 < 22.2.10.14
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 23.0.0 < 23.0.12.9
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.12.5
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 25.0.0 < 25.0.9
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.9
Nextcloud ≫ Nextcloud Server SwEdition- Version >= 26.0.0 < 26.0.4
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.4
Nextcloud ≫ Nextcloud Server Version27.0.0 SwEdition-
Nextcloud ≫ Nextcloud Server Version27.0.0 SwEditionenterprise
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemNextcloud
≫
Produkt
Server
Version
>= 25.0.0, < 25.0.9
Version
>= 26.0.0, < 26.0.4
Version
>= 27.0.0, < 27.0.1
SystemNextcloud
≫
Produkt
Enterprise Server
Version
>= 22.0.0, < 22.2.10.14
Version
>= 23.0.0, < 23.0.12.9
Version
>= 24.0.0, < 24.0.12.5
Version
>= 25.0.0, < 25.0.9
Version
>= 26.0.0, < 26.0.4
Version
>= 27.0.0, < 27.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.44% | 0.633 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| security-advisories@github.com | 5.8 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
CWE-307 Improper Restriction of Excessive Authentication Attempts
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.