Vulnerability Description
Nextcloud mail is an email app for the nextcloud home server platform. In versions prior to 2.2.2 user's passwords were stored in cleartext in the database during the duration of OAuth2 setup procedure. Any attacker or malicious user with access to the database would have access to these user passwords until the OAuth setup has been completed. It is recommended that the Nextcloud Mail app is upgraded to 2.2.2. There are no known workarounds for this issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nextcloud | < 2.2.2 |
Related Weaknesses (CWE)
References
- https://github.com/nextcloud/mail/pull/7797Patch
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-xVendor Advisory
- https://hackerone.com/reports/1806275Permissions RequiredThird Party Advisory
- https://github.com/nextcloud/mail/pull/7797Patch
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-xVendor Advisory
- https://hackerone.com/reports/1806275Permissions RequiredThird Party Advisory
FAQ
What is CVE-2023-23944?
CVE-2023-23944 is a vulnerability with a CVSS score of 2.0 (LOW). Nextcloud mail is an email app for the nextcloud home server platform. In versions prior to 2.2.2 user's passwords were stored in cleartext in the database during the duration of OAuth2 setup procedur...
How severe is CVE-2023-23944?
CVE-2023-23944 has been rated LOW with a CVSS base score of 2.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23944?
Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Mail.