Skip to content

Missing brute force protection on password reset token

Moderate
nickvergessen published GHSA-v243-x6jc-42mp Mar 27, 2023

Package

Server (Nextcloud)

Affected versions

>= 24.0.0, >= 25.0.0

Patched versions

24.0.10, 25.0.4
Server (Nextcloud Enterprise)
>= 21.0.0, >= 22.0.0, >= 23.0.0, >= 24.0.0, >= 25.0.0
21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, 25.0.4

Description

Impact

A malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token.

Patches

It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4
It is recommended that the Nextcloud Enterprise Server is upgraded to 21.0.9.10 or 22.2.10.10 or 23.0.12.5 or 24.0.10 or 25.0.4

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L

CVE ID

CVE-2023-25818

Weaknesses

Credits