Security restrictions bypass in Nextcloud Server



Published: 2018-02-07
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-0936
CWE-ID CWE-566
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Nextcloud Server
Client/Desktop applications / Messaging software

Vendor Nextcloud

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Authorization bypass through user-controlled SQL primary key

EUVDB-ID: #VU12595

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-0936

CWE-ID: CWE-566 - Authorization Bypass Through User-Controlled SQL Primary Key

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to bypass security restrictions and on the target system.

The weakness exists due to authorization bypass through user-controlled key. A remote attacker can change the scope of app passwords of other users and write arbitrary files on the target system.

Mitigation

Update to versions 11.0.7 or 12.0.5.

Vulnerable software versions

Nextcloud Server: 11.0.0 - 12.0.4

External links

http://nextcloud.com/security/advisory/?id=nc-sa-2018-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###