CVE-2023-45149

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45149
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45149.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45149
Aliases
  • GHSA-7rf8-pqmj-rpqv
Published
2023-10-16T20:15:15Z
Modified
2024-06-06T14:25:17.997613Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/nextcloud/spreed

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Type
GIT
Repo
https://github.com/nextcloud/talk-android
Events

Affected versions

v15.*

v15.0.0
v15.0.1
v15.0.2
v15.0.3
v15.0.4
v15.0.5
v15.0.6
v15.0.7