42 строки
1.1 KiB
JSON
42 строки
1.1 KiB
JSON
{
|
|
"Title": "SSRF protection bypass in calendar subscriptions",
|
|
"Timestamp": 1576108800,
|
|
"Risk": 1,
|
|
"CVSS3": {
|
|
"score": 6.3,
|
|
"vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
|
|
},
|
|
"CWE": {
|
|
"id": 918,
|
|
"name": "Server-Side Request Forgery (SSRF)"
|
|
},
|
|
"HackerOne": 736867,
|
|
"Affected":[
|
|
{
|
|
"Version":"17.0.2",
|
|
"CVE":"CVE-2020-8138",
|
|
"Operator":"<"
|
|
},
|
|
{
|
|
"Version":"16.0.7",
|
|
"CVE":"CVE-2020-8138",
|
|
"Operator":"<"
|
|
},
|
|
{
|
|
"Version":"15.0.14",
|
|
"CVE":"CVE-2020-8138",
|
|
"Operator":"<"
|
|
}
|
|
],
|
|
"Description":"A missing check for IPv4 nested inside IPv6 in Nextcloud server 17.0.1 allowed a SSRF when subscribing to a malicious calendar URL.",
|
|
"ActionTaken": "The error has been fixed.",
|
|
"Acknowledgment":[
|
|
{
|
|
"Name": "Tim Coen",
|
|
"Website": "https://security-consulting.icu/blog/",
|
|
"Reason": "Vulnerability discovery and disclosure."
|
|
}
|
|
],
|
|
"Resolution": "It is recommended that the Nextcloud server is upgraded to 17.0.2."
|
|
}
|