First published: Fri May 26 2023(Updated: )
Nextcloud server is an open source personal cloud implementation. Missing brute-force protection on the WebDAV endpoints via the basic auth header allowed to brute-force user credentials when the provided user name was not an email address. Users from version 24.0.0 onward are affected. This issue has been addressed in releases 24.0.11, 25.0.5 and 26.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.0<25.0.5 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32319 is a vulnerability in the Nextcloud server that allows for brute-force attacks on WebDAV endpoints via the basic auth header.
Users from version 24.0.0 onward are affected by CVE-2023-32319.
CVE-2023-32319 has a severity keyword of 'medium' and a severity value of 6.5.
To fix CVE-2023-32319, you should update your Nextcloud server to version 24.0.11 or 25.0.5.
Yes, you can find additional information about CVE-2023-32319 in the Nextcloud security advisories and the GitHub pull request linked in the references.