5.3

CVE-2023-39959

Existence of calendars and address books can be checked by unauthenticated users

Existance of calendars and addressbooks can be checked by unauthenticated users

Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Mögliche Gegenmaßnahme
Server: * No workaround available
Enterprise Server: * No workaround available
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEdition- Version >= 25.0.0 < 25.0.9
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.9
NextcloudNextcloud Server SwEdition- Version >= 26.0.0 < 26.0.4
NextcloudNextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.4
NextcloudNextcloud Server Version27.0.0 SwEdition-
NextcloudNextcloud Server Version27.0.0 SwEditionenterprise
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemNextcloud
Produkt Server
Version >= 25.0.0, < 25.0.9
Version >= 26.0.0, < 26.0.4
Version >= 27.0.0, < 27.0.1
SystemNextcloud
Produkt Enterprise Server
Version >= 25.0.0, < 25.0.9
Version >= 26.0.0, < 26.0.4
Version >= 27.0.0, < 27.0.1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.82% 0.745
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
security-advisories@github.com 3.5 2.1 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.