First published: Mon Mar 27 2023(Updated: )
Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=21.0.0<21.0.9.10 | |
Nextcloud Nextcloud Server | >=22.0.0<22.2.10.10 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.12.5 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 |
https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25818 is a vulnerability in Nextcloud Server, where a malicious user could reset the password of another user and attempt to brute force the password reset token.
CVE-2023-25818 has a severity rating of 7.1 (high).
CVE-2023-25818 affects Nextcloud Server versions 21.0.0 to 21.0.9.10, 22.0.0 to 22.2.10.10, 23.0.0 to 23.0.12.5, 24.0.0 to 24.0.10, and 25.0.0 to 25.0.4.
To fix CVE-2023-25818, it is recommended to update Nextcloud Server to the latest available version. Make sure to review the official Nextcloud security advisory (link provided) for more detailed instructions.
Yes, you can find more information about CVE-2023-25818 in the official Nextcloud security advisory (link provided).