CVE-2023-28848

user_oidc is the OIDC connect user backend for Nextcloud, an open source collaboration platform. A vulnerability in versions 1.0.0 until 1.3.0 effectively allowed an attacker to bypass the state protection as they could just copy the expected state token from the first request to their second request. Users should upgrade user_oidc to 1.3.0 to receive a patch for the issue. No known workarounds are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:user_oidc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:56

Type Values Removed Values Added
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f - Vendor Advisory () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f - Vendor Advisory
References () https://github.com/nextcloud/user_oidc/pull/580 - Patch, Vendor Advisory () https://github.com/nextcloud/user_oidc/pull/580 - Patch, Vendor Advisory
References () https://hackerone.com/reports/1878381 - Third Party Advisory () https://hackerone.com/reports/1878381 - Third Party Advisory
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 4.8

Information

Published : 2023-04-04 13:15

Updated : 2024-11-21 07:56


NVD link : CVE-2023-28848

Mitre link : CVE-2023-28848

CVE.ORG link : CVE-2023-28848


JSON object : View

Products Affected

nextcloud

  • user_oidc
CWE
CWE-352

Cross-Site Request Forgery (CSRF)