MEDIUM · 5.0

CVE-2020-8118

An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.

Vulnerability Description

An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.

CVSS Score

5.0

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
NextcloudNextcloud Server< 15.0.9
OpensuseBackports Sle15.0
NovellSuse Linux Enterprise Server12.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-8118?

CVE-2020-8118 is a vulnerability with a CVSS score of 5.0 (MEDIUM). An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.

How severe is CVE-2020-8118?

CVE-2020-8118 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-8118?

Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Nextcloud Server, Opensuse Backports Sle, Novell Suse Linux Enterprise Server.