First published: Tue Nov 21 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=22.0.0<22.2.10.16 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.12.11 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.12.7 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.11 | |
Nextcloud Nextcloud Server | >=25.0.0<25.0.11 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.6 | |
Nextcloud Nextcloud Server | >=26.0.0<26.0.6 | |
Nextcloud Nextcloud Server | >=27.0.0<27.1.0 | |
Nextcloud Nextcloud Server | >=27.0.0<27.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48306 is a vulnerability in Nextcloud Server that allows for DNS rebinding and SSRF attacks.
CVE-2023-48306 has a severity rating of 9.8 (Critical).
Versions prior to 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and prior to 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server Enterprise are affected by CVE-2023-48306.
CVE-2023-48306 can be exploited by tricking the Nextcloud Server DNS pin middleware into DNS rebinding, allowing for SSRF attacks.
Yes, the fix for CVE-2023-48306 is included in versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server.