CVE-2023-32318

Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:26.0.0:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:26.0.0:*:*:*:enterprise:*:*:*

History

02 Jun 2023, 12:57

Type Values Removed Values Added
CPE cpe:2.3:a:nextcloud:nextcloud_server:26.0.0:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:26.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
First Time Nextcloud nextcloud Server
Nextcloud
CWE CWE-613
References (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38 - (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38 - Vendor Advisory
References (MISC) https://github.com/nextcloud/text/pull/3946 - (MISC) https://github.com/nextcloud/text/pull/3946 - Patch

26 May 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-26 18:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-32318

Mitre link : CVE-2023-32318

CVE.ORG link : CVE-2023-32318


JSON object : View

Products Affected

nextcloud

  • nextcloud_server
CWE
CWE-613

Insufficient Session Expiration