CVE-2023-45150

Source
https://cve.org/CVERecord?id=CVE-2023-45150
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45150.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45150
Aliases
  • GHSA-r936-8gwm-w452
Published
2023-10-16T19:06:03.674Z
Modified
2026-04-02T09:25:28.659768Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
Inviting excessive long email addresses to a calendar event makes the Nextcloud server unresponsive
Details

Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/45xxx/CVE-2023-45150.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Git / github.com/nextcloud/calendar

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/calendar
Events

Affected versions

v1.*
v1.0
v1.1
v1.2
v1.2.1
v1.2.2
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.4.1
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.5.4
v1.5.5
v1.5.6
v1.5.7
v1.5.8
v1.6.0
v1.6.1
v1.6.2
v1.6.2-alpha-recurrence-question
v1.6.3
v1.6.4
v1.6.5
v1.6.6
v1.7.0
v1.7.1
v1.7.2
v1.7.3
v2.*
v2.0.0
v2.0.0-beta1
v2.0.0-beta2
v2.0.0-beta3
v2.0.0-beta3-nc18build
v2.0.0-rc1
v2.0.0-rc1-nc18build
v2.0.1
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.1.0
v2.1.1
v2.1.2
v2.1.3
v2.2.0
v2.2.1
v2.2.2
v2.3.0
v2.3.0-RC.1
v2.3.0-alpha.1
v2.3.0-alpha.2
v2.3.0-alpha.3
v2.3.1
v2.3.2
v2.3.3
v2.3.4
v2.4.0
v2.4.0-rc.1
v2.4.0-rc2
v3.*
v3.0.0
v3.0.0-beta1
v3.0.0-beta2
v3.0.0-rc1
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.0.5
v3.0.6
v3.1.0
v3.1.0-rc1
v3.2.0
v3.2.1
v3.2.2
v3.3.0
v3.3.1
v3.3.1-RC1
v3.3.2
v3.3.3
v3.4.0
v3.4.0-rc1
v3.4.1
v3.4.2
v3.4.2-rc1
v3.4.3
v3.5.0
v3.5.1
v3.5.2
v3.5.3
v3.5.4
v3.5.5
v3.5.6
v3.5.7
v3.5.8
v3.5.9
v4.*
v4.0.0
v4.0.0-alpha1
v4.0.0-alpha2
v4.0.0-rc1
v4.0.1
v4.0.2
v4.1.0
v4.1.1
v4.1.2
v4.2.0
v4.2.0-rc1
v4.2.1
v4.2.2
v4.2.3
v4.2.4
v4.3.0
v4.3.0-alpha1
v4.3.0-rc.2
v4.3.0-rc1
v4.3.1
v4.3.2
v4.3.3
v4.3.4
v4.3.5
v4.4.0
v4.4.0-alpha2
v4.4.0-beta1
v4.4.0-rc.3
v4.4.0-rc1
v4.4.0-rc2
v4.4.1
v4.4.2
v4.4.2-rc1
v4.4.3
v4.5.0
v4.5.0-alpha1
v4.5.0-alpha2
v4.5.0-beta1
v4.5.0-beta2
v4.5.0-rc2
v4.5.1
v4.5.2
v4.5.3
v4.6.0
v4.6.0-beta.1
v4.6.0-rc1
v4.6.1
v4.6.2
v4.6.3
v4.6.4
v4.6.5
v4.6.6
v4.6.7
v4.6.8
v4.7.0
v4.7.0-alpha1
v4.7.0-beta.1
v4.7.0-beta2
v4.7.0-beta3
v4.7.0-beta4
v4.7.0-rc1
v4.7.0-rc2
v4.7.1
v4.7.10
v4.7.11
v4.7.12
v4.7.13
v4.7.14
v4.7.15
v4.7.16
v4.7.17
v4.7.18
v4.7.19
v4.7.2
v4.7.20
v4.7.3
v4.7.4
v4.7.5
v4.7.6
v4.7.7
v4.7.8
v4.7.9
v5.*
v5.0.0
v5.0.0-alpha1
v5.0.0-alpha2
v5.0.0-alpha3
v5.0.0-alpha4
v5.0.0-beta1
v5.0.0-beta2
v5.0.0-beta3
v5.0.0-rc.1
v5.0.1
v5.0.10
v5.0.2
v5.0.3
v5.0.4
v5.0.5
v5.0.6
v5.0.7
v5.0.8
v5.0.9
v5.1.0
v5.1.0-alpha1
v5.1.0-alpha2
v5.1.0-beta1
v5.1.0-beta2
v5.1.0-beta3
v5.1.0-rc.4
v5.1.0-rc.5
v5.1.0-rc1
v5.1.0-rc2
v5.1.0-rc3
v5.1.1
v5.1.2
v5.1.3
v5.2.0
v5.2.0-rc1
v5.2.1
v5.2.2
v5.2.3
v5.2.4
v5.3.0
v5.3.0-RC.1
v5.3.1
v5.3.10
v5.3.2
v5.3.3
v5.3.4
v5.3.5
v5.3.6
v5.3.7
v5.3.8
v5.3.9
v5.4.0-rc.1
v5.4.0-rc.2
v5.4.0-rc.3
v5.4.0-rc.4
v5.4.0-rc.5
v5.5.0
v5.5.1
v5.5.10
v5.5.11
v5.5.12
v5.5.13
v5.5.14
v5.5.15
v5.5.16
v5.5.2
v5.5.3
v5.5.4
v5.5.5
v5.5.6
v5.5.7
v5.5.8
v5.5.9
v6.*
v6.0.0
v6.0.0-rc.1
v6.0.0-rc.2
v6.0.0-rc.3
v6.0.0-rc.4
v6.0.0-rc.5
v6.0.0-rc.6
v6.0.1
v6.0.2
v6.0.3
v6.0.4
v6.1.0
v6.1.1
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.2.0
v6.2.0-beta.0
v6.2.0-beta.1
v6.2.0-rc.1
v6.2.1
v6.2.2
v6.3.0-beta.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45150.json"