{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-22469","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2022-12-29T03:00:40.880Z","datePublished":"2023-01-10T20:26:27.108Z","dateUpdated":"2025-03-10T21:30:54.229Z"},"containers":{"cna":{"title":"Nextcloud Deck card vulnerable to data leak to unauthorized users via reference preview cache","problemTypes":[{"descriptions":[{"cweId":"CWE-922","lang":"en","description":"CWE-922: Insecure Storage of Sensitive Information","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq","tags":["x_refsource_CONFIRM"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq"},{"name":"https://github.com/nextcloud/deck/pull/4196","tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/deck/pull/4196"}],"affected":[{"vendor":"nextcloud","product":"security-advisories","versions":[{"version":"< 1.8.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-01-10T20:26:27.108Z"},"descriptions":[{"lang":"en","value":"Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.\n"}],"source":{"advisory":"GHSA-8fjp-w9gp-j5hq","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:13:48.353Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq"},{"name":"https://github.com/nextcloud/deck/pull/4196","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/deck/pull/4196"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-10T21:01:43.819961Z","id":"CVE-2023-22469","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-10T21:30:54.229Z"}}]}}