Bug 1218385 (CVE-2023-49792) - VUL-0: CVE-2023-49792: nextcloud: authentication rate limiting bypass via reverse proxy
Summary: VUL-0: CVE-2023-49792: nextcloud: authentication rate limiting bypass via rev...
Status: NEW
Alias: CVE-2023-49792
Product: openSUSE Distribution
Classification: openSUSE
Component: Other (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Eric Schirra
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/389223/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-12-24 09:13 UTC by SMASH SMASH
Modified: 2024-04-16 07:58 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-12-24 09:13:04 UTC
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-49792
Comment 1 Eric Schirra 2023-12-25 10:55:02 UTC
Version 24 is End of Life since 2023-04.
Version 24.0.12 is the latest code. And 24.0.12.9 is only aviable for Enterprise.
And Leap 15.6 is not released at this time.
So, please push latest version 28 from factory to Leap 15.6.
Comment 2 Eric Schirra 2024-04-16 07:58:54 UTC
Wahts going on?
Can i close?