CVE-2023-35171

NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.
References
Link Resource
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4 Exploit Issue Tracking Vendor Advisory
https://github.com/nextcloud/server/pull/38194 Issue Tracking Patch
https://hackerone.com/reports/1977222 Exploit Issue Tracking Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*

History

03 Jul 2023, 19:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-23 21:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-35171

Mitre link : CVE-2023-35171

CVE.ORG link : CVE-2023-35171


JSON object : View

Products Affected

nextcloud

  • nextcloud_server
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')