First published: Mon Oct 16 2023(Updated: )
Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.0<25.0.8 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.8 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.3 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.3 | |
Nextcloud Nextcloud Server | =27.0.0 | |
Nextcloud Nextcloud Server | =27.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Nextcloud server vulnerability is CVE-2023-45151.
The severity of CVE-2023-45151 is high.
The affected software for CVE-2023-45151 is Nextcloud Server versions 25.0.0 through 25.0.8, Nextcloud Server versions 26.0.0 through 26.0.3, and Nextcloud Server version 27.0.0.
An attacker can exploit CVE-2023-45151 by gaining access to the Nextcloud server and obtaining plaintext OAuth2 tokens.
To fix CVE-2023-45151, users are recommended to upgrade their Nextcloud Server to a version that addresses the issue.