First published: Fri Jun 23 2023(Updated: )
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=26.0.0<26.0.2 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35171 is a vulnerability in NextCloud Server and NextCloud Enterprise Server that allows an attacker to redirect a victim to a malicious site using a supplied URL.
The severity of CVE-2023-35171 is medium with a CVSS score of 6.1.
CVE-2023-35171 affects NextCloud Server and NextCloud Enterprise Server versions 26.0.0 to 26.0.2.
Yes, the fix for CVE-2023-35171 is available in NextCloud Server version 26.0.2 or later.
More information about CVE-2023-35171 can be found in the following references: [GitHub Security Advisory](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4), [GitHub Pull Request](https://github.com/nextcloud/server/pull/38194), [HackerOne Report](https://hackerone.com/reports/1977222).