mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
110 lines
4.0 KiB
JSON
110 lines
4.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-23943",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Nextcloud mail is an email app for the nextcloud home server platform. In affected versions the SMTP, IMAP and Sieve host fields allowed to scan for internal services and servers reachable from within the local network of the Nextcloud Server. It is recommended that the Nextcloud Maill app is upgraded to 1.15.0 or 2.2.2. The only known workaround for this issue is to completely disable the nextcloud mail app."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-918: Server-Side Request Forgery (SSRF)",
|
|
"cweId": "CWE-918"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "nextcloud",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "security-advisories",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": ">= 2.0.0, < 2.2.2",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "< 1.15.0",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6"
|
|
},
|
|
{
|
|
"url": "https://github.com/nextcloud/mail/pull/7796",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/nextcloud/mail/pull/7796"
|
|
},
|
|
{
|
|
"url": "https://hackerone.com/reports/1736390",
|
|
"refsource": "MISC",
|
|
"name": "https://hackerone.com/reports/1736390"
|
|
},
|
|
{
|
|
"url": "https://hackerone.com/reports/1741525",
|
|
"refsource": "MISC",
|
|
"name": "https://hackerone.com/reports/1741525"
|
|
},
|
|
{
|
|
"url": "https://hackerone.com/reports/1746582",
|
|
"refsource": "MISC",
|
|
"name": "https://hackerone.com/reports/1746582"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-8gcx-r739-9pf6",
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |