#VU12595 Authorization bypass through user-controlled SQL primary key in Nextcloud Server


Published: 2018-05-11 | Updated: 2018-05-14

Vulnerability identifier: #VU12595

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-0936

CWE-ID: CWE-566

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Nextcloud Server
Client/Desktop applications / Messaging software

Vendor: Nextcloud

Description
The vulnerability allows a remote authenticated attacker to bypass security restrictions and on the target system.

The weakness exists due to authorization bypass through user-controlled key. A remote attacker can change the scope of app passwords of other users and write arbitrary files on the target system.

Mitigation
Update to versions 11.0.7 or 12.0.5.

Vulnerable software versions

Nextcloud Server: 11.0.0 - 12.0.4


External links
http://nextcloud.com/security/advisory/?id=nc-sa-2018-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability