Bug 1214184 (CVE-2023-39954)

Summary: VUL-0: CVE-2023-39954: nextcloud: read access to database snapshot leads to server impersonation
Product: [openSUSE] openSUSE Distribution Reporter: Carlos López <carlos.lopez>
Component: SecurityAssignee: Eric Schirra <ecsos>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P5 - None    
Version: Leap 15.4   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/374981/
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Carlos López 2023-08-11 09:01:13 UTC
CVE-2023-39954

user_oidc provides the OIDC connect user backend for Nextcloud, an open-source
cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, an
attacker that obtained at least read access to a snapshot of the database can
impersonate the Nextcloud server towards linked servers. user_oidc 1.3.3
contains a patch. No known workarounds are available.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39954
https://bugzilla.redhat.com/show_bug.cgi?id=2231145
https://www.cve.org/CVERecord?id=CVE-2023-39954
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq
https://github.com/nextcloud/user_oidc/pull/636
https://hackerone.com/reports/1994328
Comment 1 Carlos López 2023-08-11 09:04:24 UTC
user_oidc is not in openSUSE, closing.