First published: Tue Apr 04 2023(Updated: )
user_oidc is the OIDC connect user backend for Nextcloud, an open source collaboration platform. A vulnerability in versions 1.0.0 until 1.3.0 effectively allowed an attacker to bypass the state protection as they could just copy the expected state token from the first request to their second request. Users should upgrade user_oidc to 1.3.0 to receive a patch for the issue. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud User Oidc | >=1.0.0<1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28848 is a vulnerability in the user_oidc backend for Nextcloud that allows an attacker to bypass state protection.
Versions 1.0.0 until 1.3.0 of the user_oidc backend for Nextcloud are affected by CVE-2023-28848.
CVE-2023-28848 has a severity rating of 5.4 (medium).
An attacker can exploit CVE-2023-28848 by copying the expected state token from the first request to their second request, effectively bypassing state protection.
You can find more information about CVE-2023-28848 in the Nextcloud security advisory, the user_oidc pull request on GitHub, and the HackerOne report.