First published: Mon Feb 06 2023(Updated: )
Nextcloud mail is an email app for the nextcloud home server platform. In affected versions the SMTP, IMAP and Sieve host fields allowed to scan for internal services and servers reachable from within the local network of the Nextcloud Server. It is recommended that the Nextcloud Maill app is upgraded to 1.15.0 or 2.2.2. The only known workaround for this issue is to completely disable the nextcloud mail app.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud mail | <1.15.0 | |
Nextcloud mail | >=2.2.0<2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23943 is a vulnerability in Nextcloud Mail, an email app for the Nextcloud home server platform, that allows scanning for internal services and servers reachable from within the local network of the Nextcloud Server.
The severity of CVE-2023-23943 is medium with a CVSS score of 4.3.
CVE-2023-23943 affects Nextcloud Mail by allowing the scanning of internal services and servers within the local network of the Nextcloud Server.
To fix CVE-2023-23943, it is recommended to upgrade the Nextcloud Mail app to a version higher than 1.15.0 or between 2.2.0 and 2.2.2.
You can find more information about CVE-2023-23943 in the references provided: [GitHub Pull Request](https://github.com/nextcloud/mail/pull/7796), [Nextcloud Security Advisories](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6), [HackerOne Report](https://hackerone.com/reports/1736390).