Vulnerability identifier: #VU12595
Vulnerability risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-566
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Nextcloud Server
Client/Desktop applications /
Messaging software
Vendor: Nextcloud
Description
The vulnerability allows a remote authenticated attacker to bypass security restrictions and on the target system.
The weakness exists due to authorization bypass through user-controlled key. A remote attacker can change the scope of app passwords of other users and write arbitrary files on the target system.
Mitigation
Update to versions 11.0.7 or 12.0.5.
Vulnerable software versions
Nextcloud Server: 11.0.0 - 12.0.4
External links
http://nextcloud.com/security/advisory/?id=nc-sa-2018-001
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.