First published: Thu Mar 30 2023(Updated: )
Nextcloud server is an open source home cloud implementation. In affected versions the generated fallback password when creating a share was using a weak complexity random number generator, so when the sharer did not change it the password could be guessable to an attacker willing to brute force it. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. This issue only affects users who do not have a password policy enabled, so enabling a password policy is an effective mitigation for users unable to upgrade.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=23.0.0<23.0.14 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.10 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28835 is a vulnerability in Nextcloud server that allows an attacker to guess the generated fallback password when creating a share.
In affected versions of Nextcloud server, the generated fallback password for a share is created using a weak complexity random number generator, making it guessable to an attacker.
The severity of CVE-2023-28835 is high, with a severity value of 7.5.
An attacker can exploit CVE-2023-28835 by brute forcing the guessable fallback password created for a share in affected versions of Nextcloud server.
To fix CVE-2023-28835, it is recommended to update Nextcloud server to a version that includes the fix for this vulnerability.