CVE-2018-3761

Nextcloud Server before 12.0.8 and 13.0.3 suffer from improper authentication on the OAuth2 token endpoint. Missing checks potentially allowed handing out new tokens in case the OAuth2 client was partly compromised.
References
Link Resource
https://hackerone.com/reports/343111 Third Party Advisory
https://nextcloud.com/security/advisory/?id=nc-sa-2018-003 Broken Link Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*

History

28 Feb 2023, 17:51

Type Values Removed Values Added
CPE cpe:2.3:a:nextcloud:nextcloud_server:13.0.3:*:*:*:*:*:*:*
References (CONFIRM) https://nextcloud.com/security/advisory/?id=nc-sa-2018-003 - Vendor Advisory (CONFIRM) https://nextcloud.com/security/advisory/?id=nc-sa-2018-003 - Broken Link, Vendor Advisory

Information

Published : 2018-07-05 16:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-3761

Mitre link : CVE-2018-3761

CVE.ORG link : CVE-2018-3761


JSON object : View

Products Affected

nextcloud

  • nextcloud_server
CWE
CWE-287

Improper Authentication