First published: Fri May 26 2023(Updated: )
Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.2<25.0.6 | |
Nextcloud Nextcloud Server | >=25.0.2<25.0.6 | |
Nextcloud Nextcloud Server | =26.0.0 | |
Nextcloud Nextcloud Server | =26.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Nextcloud server vulnerability is CVE-2023-32318.
CVE-2023-32318 has a severity level of medium (6.7).
CVE-2023-32318 affects Nextcloud Server versions between 25.0.2 and 25.0.6 (inclusive), as well as version 26.0.0.
The vulnerability in session handling between Nextcloud Server and the Nextcloud Text app prevents a correct destruction of the session on logout if cookies are not cleared manually.
Yes, a fix for CVE-2023-32318 is available.