security-advisories/server/nc-sa-2020-014.json

42 строки
1.1 KiB
JSON

{
"Title": "SSRF protection bypass in calendar subscriptions",
"Timestamp": 1576108800,
"Risk": 1,
"CVSS3": {
"score": 6.3,
"vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
"CWE": {
"id": 918,
"name": "Server-Side Request Forgery (SSRF)"
},
"HackerOne": 736867,
"Affected":[
{
"Version":"17.0.2",
"CVE":"CVE-2020-8138",
"Operator":"<"
},
{
"Version":"16.0.7",
"CVE":"CVE-2020-8138",
"Operator":"<"
},
{
"Version":"15.0.14",
"CVE":"CVE-2020-8138",
"Operator":"<"
}
],
"Description":"A missing check for IPv4 nested inside IPv6 in Nextcloud server 17.0.1 allowed a SSRF when subscribing to a malicious calendar URL.",
"ActionTaken": "The error has been fixed.",
"Acknowledgment":[
{
"Name": "Tim Coen",
"Website": "https://security-consulting.icu/blog/",
"Reason": "Vulnerability discovery and disclosure."
}
],
"Resolution": "It is recommended that the Nextcloud server is upgraded to 17.0.2."
}