CVE-2023-32320: Nextcloud Server's brute force protection allows someone to send more requests than intended

8.7 CVSS

Description

Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.

Classification

CVE ID: CVE-2023-32320

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

Affected Products

Vendor: nextcloud

Product: security-advisories

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.15% (probability of being exploited)

EPSS Percentile: 52.13% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg
https://github.com/nextcloud/server/pull/38274
https://hackerone.com/reports/1918525

Timeline