First published: Fri Oct 13 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=22.0.0<22.2.10.14 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.12.9 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.12.5 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.9 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.9 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.4 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39960 is a vulnerability in Nextcloud Server and Nextcloud Enterprise Server that allows unauthorized access to protected files.
The severity of CVE-2023-39960 is high, with a severity score of 7.5.
Nextcloud Server versions 25.0.0 to 25.0.9 and 26.0.0 to 26.0.4 are affected by CVE-2023-39960.
Nextcloud Enterprise Server versions 22.0.0 to 22.2.10.14, 23.0.0 to 23.0.12.9, 24.0.0 to 24.0.12.5, 25.0.0 to 25.0.9, and 26.0.0 to 26.0.4 are affected by CVE-2023-39960.
To fix CVE-2023-39960, it is recommended to update Nextcloud Server or Nextcloud Enterprise Server to the latest version available.