First published: Fri Jun 23 2023(Updated: )
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=16.0.0<19.0.13.9 | |
Nextcloud Nextcloud Server | >=20.0.0<20.0.14.14 | |
Nextcloud Nextcloud Server | >=21.0.0<21.0.9.12 | |
Nextcloud Nextcloud Server | >=22.0.0<22.2.10.12 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.12.7 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.12.2 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.7 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.7 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.2 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NextCloud Server vulnerability is CVE-2023-35927.
The severity of CVE-2023-35927 is high with a CVSS score of 8.1.
NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2 are affected by CVE-2023-35927.
To fix the CVE-2023-35927 vulnerability, it is recommended to update NextCloud Server to version 26.0.3 or later, and Nextcloud Enterprise Server to version 23.0.12.8 or later.
More information about CVE-2023-35927 can be found in the following references: [GitHub Security Advisory](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87), [Nextcloud Server Pull Request](https://github.com/nextcloud/server/pull/38247), and [HackerOne Report](https://hackerone.com/reports/1976754).