Vulnerability Description
Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nextcloud | Calendar | >= 1.0, < 4.4.4 |
Related Weaknesses (CWE)
References
- https://github.com/nextcloud/calendar/pull/5358Patch
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8Vendor Advisory
- https://hackerone.com/reports/2058337ExploitIssue Tracking
- https://github.com/nextcloud/calendar/pull/5358Patch
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8Vendor Advisory
- https://hackerone.com/reports/2058337ExploitIssue Tracking
FAQ
What is CVE-2023-45150?
CVE-2023-45150 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabyte...
How severe is CVE-2023-45150?
CVE-2023-45150 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45150?
Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Calendar.