CVE-2023-35172: Nextcloud Server password reset endpoint is not brute force protected

8.7 CVSS

Description

NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, an attacker can bruteforce the password reset links. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. No known workarounds are available.

Classification

CVE ID: CVE-2023-35172

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

Affected Products

Vendor: nextcloud

Product: security-advisories

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.11% (probability of being exploited)

EPSS Percentile: 46.12% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6
https://github.com/nextcloud/server/pull/38267
https://hackerone.com/reports/1987062

Timeline