Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv | Vendor Advisory | 
| https://github.com/nextcloud/spreed/pull/10545 | Issue Tracking Patch | 
| https://hackerone.com/reports/2094473 | Permissions Required | 
| https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv | Vendor Advisory | 
| https://github.com/nextcloud/spreed/pull/10545 | Issue Tracking Patch | 
| https://hackerone.com/reports/2094473 | Permissions Required | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 08:26
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-10-16 20:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45149
Mitre link : CVE-2023-45149
CVE.ORG link : CVE-2023-45149
JSON object : View
Products Affected
                nextcloud
- talk
CWE
                
                    
                        
                        CWE-307
                        
            Improper Restriction of Excessive Authentication Attempts
