First published: Mon Apr 03 2023(Updated: )
Nextcloud Server is an open source personal cloud server. Nextcloud Server 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4, have an information disclosure vulnerability. A user was able to get the full data directory path of the Nextcloud server from an API endpoint. By itself this information is not problematic as it can also be guessed for most common setups, but it could speed up other unknown attacks in the future if the information is known. Nextcloud Server 24.0.6 and 25.0.4 and Nextcloud Enterprise Server 23.0.11, 24.0.6, and 25.0.4 contain patches for this issue. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=23.0.0<23.0.14 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-28834.
The severity of CVE-2023-28834 is medium, with a severity value of 4.3.
CVE-2023-28834 affects Nextcloud Server versions 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server versions 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4.
CVE-2023-28834 is an information disclosure vulnerability, allowing a user to obtain sensitive information.
To fix the CVE-2023-28834 vulnerability, update Nextcloud Server to versions 24.0.7 or 25.0.5, or update Nextcloud Enterprise Server to versions 23.0.12, 24.0.7, or 25.0.5.