Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38 | Vendor Advisory |
https://github.com/nextcloud/text/pull/3946 | Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-05-26 18:15
Updated : 2023-06-02 12:57
NVD link : CVE-2023-32318
Mitre link : CVE-2023-32318
CVE.ORG link : CVE-2023-32318
JSON object : View
Products Affected
nextcloud
- nextcloud_server
CWE
CWE-613
Insufficient Session Expiration