CVE Vulnerabilities

CVE-2023-39960

Improper Restriction of Excessive Authentication Attempts

Published: Oct 13, 2023 | Modified: Oct 18, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Nextcloud_server Nextcloud 22.0.0 (including) 22.2.10.14 (excluding)
Nextcloud_server Nextcloud 23.0.0 (including) 23.0.12.9 (excluding)
Nextcloud_server Nextcloud 24.0.0 (including) 24.0.12.5 (excluding)
Nextcloud_server Nextcloud 25.0.0 (including) 25.0.9 (excluding)
Nextcloud_server Nextcloud 26.0.0 (including) 26.0.4 (excluding)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References