Nextcloud Server RateLimiting Bypass via Parallel Requests (v25.0.7/26.0.2)
CVE-2023-32320 Published on June 22, 2023
Nextcloud Server's brute force protection allows someone to send more requests than intended
Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.
Vulnerability Analysis
CVE-2023-32320 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Improper Restriction of Excessive Authentication Attempts
The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
Products Associated with CVE-2023-32320
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-32320 are published in these products:
Affected Versions
nextcloud security-advisories:- Version Nextcloud Server >= 25.0.0, < 25.0.7 is affected.
- Version Nextcloud Server >= 26.0.0, < 26.0.2 is affected.
- Version Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12 is affected.
- Version Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12 is affected.
- Version Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7 is affected.
- Version Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2 is affected.
- Version Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 is affected.
- Version Nextcloud Enterprise Server >= 26.0.0, < 26.0.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.