First published: Fri Dec 22 2023(Updated: )
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | >=23.0.0<23.0.12.13 | |
Nextcloud Server | >=24.0.0<24.0.12.9 | |
Nextcloud Server | >=25.0.0<25.0.13.4 | |
Nextcloud Server | >=26.0.0<26.0.9 | |
Nextcloud Server | >=26.0.0<26.0.9 | |
Nextcloud Server | >=27.0.0<27.1.4 | |
Nextcloud Server | >=27.0.0<27.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49792 has not been officially assigned a severity score but it affects multiple versions of Nextcloud Server.
To fix CVE-2023-49792, upgrade to Nextcloud Server versions 26.0.9, 27.1.4, or the corresponding versions for Nextcloud Enterprise Server.
CVE-2023-49792 affects Nextcloud Server versions prior to 26.0.9 and 27.1.4, along with several versions of Nextcloud Enterprise Server.
The details of CVE-2023-49792 suggest it may involve security risks related to proxy configurations rather than direct remote code execution.
If upgrading is not possible, you should investigate additional security measures such as configuring reverse proxies securely or applying any available patches.