Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35173— End-to-End encrypted file-drops can be made inaccessible

CVSS 5.7 · Medium EPSS 0.23% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-35173

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
End-to-End encrypted file-drops can be made inaccessible
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nextcloud 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nextcloud是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。 Nextcloud End-to-end encryption app 1.12.0及之前版本存在安全漏洞,该漏洞源于允许攻击者通过提供无效的元数据文件使以前丢弃的文件无法访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nextcloudsecurity-advisories >= 1.12.0, < 1.12.4 -

II. Public POCs for CVE-2023-35173

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-35173

登录查看更多情报信息。

Same Patch Batch · nextcloud · 2023-06-23 · 5 CVEs total

CVE-2023-351728.7 HIGHNextcloud Server password reset endpoint is not brute force protected
CVE-2023-359288.5 HIGHNextcloud user scoped external storage can be used to gather credentials of other users
CVE-2023-359277.6 HIGHNextcloud system addressbooks can be modified by malicious trusted server
CVE-2023-351714.1 MEDIUMNextcloud Server vulnerable to open redirect on "Unsupported browser" warning

IV. Related Vulnerabilities

V. Comments for CVE-2023-35173

No comments yet


Leave a comment