Vulnerability Details : CVE-2023-22469
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.
Products affected by CVE-2023-22469
- cpe:2.3:a:nextcloud:deck:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22469
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22469
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
2.1
|
1.4
|
NIST | |
5.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N |
1.3
|
4.0
|
GitHub, Inc. |
CWE ids for CVE-2023-22469
-
The product stores sensitive information without properly limiting read or write access by unauthorized actors.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-22469
-
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq
Deck card reference caching can leak data to unauthorized users · Advisory · nextcloud/security-advisories · GitHubExploit;Patch;Third Party Advisory
-
https://github.com/nextcloud/deck/pull/4196
Add missing userId property by juliushaertl · Pull Request #4196 · nextcloud/deck · GitHubPatch;Third Party Advisory
Jump to