Path traversal in Nextcloud Server and Nextcloud Enterprise Server - CVE-2023-25579

 

Path traversal in Nextcloud Server and Nextcloud Enterprise Server - CVE-2023-25579

Published: February 22, 2023


Vulnerability identifier: #VU72495
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-25579
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Nextcloud Server
Nextcloud Enterprise Server
Software vendor:
Nextcloud

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in OC\Files\Node\Folder::getFullPath. A remote user can send a specially crafted HTTP request and overwrite arbitrary files on the system.


Remediation

Install update from vendor's website.

External links