First published: Tue Nov 21 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.0<=25.0.13 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.13 | |
Nextcloud Nextcloud Server | >=26.0.0<=26.0.8 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.8 | |
Nextcloud Nextcloud Server | >=27.0.0<=27.1.3 | |
Nextcloud Nextcloud Server | >=27.0.0<27.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48301 is a vulnerability in Nextcloud Server that allows for HTML injection in the search UI when selecting a circle with HTML in the display name.
Versions 25.0.0 to 25.0.13, 26.0.0 to 26.0.8, and 27.0.0 to 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server are affected.
The severity of CVE-2023-48301 is medium with a CVSS score of 5.4.
An attacker can exploit CVE-2023-48301 by inserting links into circle names that will be opened when clicked.
Yes, you can find references for CVE-2023-48301 at the following links: [GitHub](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6), [GitHub Pull Request](https://github.com/nextcloud/circles/pull/1415), [HackerOne report](https://hackerone.com/reports/2210038).