First published: Tue Nov 21 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=25.0.0<25.0.11 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.11 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.6 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.6 | |
Nextcloud Nextcloud Server | >=27.0.0<27.1.0 | |
Nextcloud Nextcloud Server | >=27.0.0<27.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-48305.
The severity of CVE-2023-48305 is medium with a score of 4.2.
Nextcloud Server versions prior to 25.0.11, 26.0.6, and 27.1.0, including the enterprise edition, are affected.
When the log level is set to debug, the user_ldap app in Nextcloud Server logs user passwords in plain text.
Yes, the fix is available in Nextcloud Server versions 25.0.11, 26.0.6, and 27.1.0.