First published: Thu Aug 10 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.0<25.0.9 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.9 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.4 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.4 | |
Nextcloud Nextcloud Server | =27.0.0 | |
Nextcloud Nextcloud Server | =27.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39961 is a vulnerability in Nextcloud Server that allows users to add an image inline into a text file when a folder with images or an image was shared without download permissions.
CVE-2023-39961 affects Nextcloud Server versions 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1.
The severity of CVE-2023-39961 is medium with a CVSS score of 4.3.
To fix CVE-2023-39961, update Nextcloud Server to version 25.0.9, 26.0.4, or 27.0.1.
You can find more information about CVE-2023-39961 on the GitHub security advisory page and the HackerOne report.