First published: Thu Aug 10 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.0<25.0.9 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.9 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.4 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.4 | |
Nextcloud Nextcloud Server | =27.0.0 | |
Nextcloud Nextcloud Server | =27.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39959 is a vulnerability in Nextcloud Server that allows unauthenticated users to reveal whether a calendar or address book with a specific identifier exists.
The severity of CVE-2023-39959 is medium with a CVSS score of 5.3.
Nextcloud Server versions 25.0.0 to 25.0.9, 26.0.0 to 26.0.4, and 27.0.0 are affected by CVE-2023-39959.
Unauthenticated users can exploit CVE-2023-39959 by sending a DAV request to determine the existence of a calendar or address book.
Yes, fixes for CVE-2023-39959 are available in versions 25.0.9, 26.0.4, and 27.0.1 of Nextcloud Server.