CVE-2023-45149

Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*

History

20 Oct 2023, 12:12

Type Values Removed Values Added
First Time Nextcloud
Nextcloud talk
CPE cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
References (MISC) https://github.com/nextcloud/spreed/pull/10545 - (MISC) https://github.com/nextcloud/spreed/pull/10545 - Issue Tracking, Patch
References (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv - (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv - Vendor Advisory
References (MISC) https://hackerone.com/reports/2094473 - (MISC) https://hackerone.com/reports/2094473 - Permissions Required

16 Oct 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-16 20:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-45149

Mitre link : CVE-2023-45149

CVE.ORG link : CVE-2023-45149


JSON object : View

Products Affected

nextcloud

  • talk
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts