CVE-2023-35927

7.6 HIGH

📋 TL;DR

This vulnerability allows a malicious Nextcloud server to modify or delete VCards in the system addressbook on a trusted partner server. It affects Nextcloud Server and Enterprise Server installations configured with trusted server relationships. The impact is limited to addressbook data corruption affecting user search and avatar displays.

💻 Affected Systems

Products:
  • NextCloud Server
  • NextCloud Enterprise Server
Versions: Server: 25.0.0-25.0.6, 26.0.0-26.0.1; Enterprise: 21.0.0-21.0.9.11, 22.0.0-22.2.10.11, 23.0.0-23.0.12.6, 24.0.0-24.0.12.1, 25.0.0-25.0.6, 26.0.0-26.0.1
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured with trusted server relationships. Default installations without trusted servers are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious trusted server could systematically corrupt all addressbook entries, disrupting user lookup functionality and potentially causing operational confusion.

🟠

Likely Case

Targeted modification of specific user VCards by a compromised trusted server, causing incorrect contact information display.

🟢

If Mitigated

No impact if trusted server relationships are properly managed or removed, or if patched versions are deployed.

🌐 Internet-Facing: MEDIUM - Requires trusted server relationship which typically involves internet-facing servers, but exploitation requires specific configuration.
🏢 Internal Only: LOW - Internal-only deployments with no trusted server relationships are not vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires: 1) Trusted server relationship established, 2) Successful share secret exchange, 3) Malicious intent from trusted server. This is not a remote unauthenticated vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Server: 25.0.7, 26.0.2; Enterprise: 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, 26.0.2

Vendor Advisory: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87

Restart Required: No

Instructions:

1. Backup your Nextcloud instance. 2. Update to patched version via your package manager or manual download. 3. Run occ upgrade if needed. 4. Verify version with occ status.

🔧 Temporary Workarounds

Remove Trusted Servers

all

Remove all trusted server relationships to eliminate the attack vector

Navigate to Administration > Sharing settings and remove all trusted servers
Run: sudo -u www-data php occ dav:sync-system-addressbook

🧯 If You Can't Patch

  • Remove all trusted server relationships immediately
  • Monitor addressbook changes and audit trusted server connections

🔍 How to Verify

Check if Vulnerable:

Check if you have any trusted servers configured in Administration > Sharing settings, and verify your version against affected ranges.

Check Version:

sudo -u www-data php occ status | grep 'versionstring'

Verify Fix Applied:

Confirm version is patched and no trusted servers remain unless absolutely necessary with verified partners.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected addressbook modifications
  • Suspicious activity from trusted server IPs
  • Failed or unusual trusted server authentication attempts

Network Indicators:

  • Unusual API calls between trusted servers
  • Abnormal traffic patterns in server-to-server communications

SIEM Query:

source="nextcloud.log" AND ("addressbook" OR "vcard") AND ("modif" OR "delete" OR "corrupt")

🔗 References

📤 Share & Export