All the vulnerabilites related to nextcloud - security-advisories
cve-2022-24906
Vulnerability from cvelistv5
Published
2022-05-20 15:40
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Deck is a Kanban-style project & personal management tool for Nextcloud, similar to Trello. The full path of the application is exposed to unauthorized users. It is recommended that the Nextcloud Deck app is upgraded to 1.2.11, 1.4.6, or 1.5.4. There is no workaround available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hx9w-xfrg-2qvp | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/3384 | x_refsource_MISC | |
https://hackerone.com/reports/1354334 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.2.11 Version: >= 1.4.0, < 1.4.6 Version: >= 1.5.0, < 1.5.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hx9w-xfrg-2qvp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/3384" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1354334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.2.11" }, { "status": "affected", "version": "\u003e= 1.4.0, \u003c 1.4.6" }, { "status": "affected", "version": "\u003e= 1.5.0, \u003c 1.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Deck is a Kanban-style project \u0026 personal management tool for Nextcloud, similar to Trello. The full path of the application is exposed to unauthorized users. It is recommended that the Nextcloud Deck app is upgraded to 1.2.11, 1.4.6, or 1.5.4. There is no workaround available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-20T15:40:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hx9w-xfrg-2qvp" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/3384" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1354334" } ], "source": { "advisory": "GHSA-hx9w-xfrg-2qvp", "discovery": "UNKNOWN" }, "title": "Error in deleting deck cards attachment reveals the full application path in Nextcloud Deck", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24906", "STATE": "PUBLIC", "TITLE": "Error in deleting deck cards attachment reveals the full application path in Nextcloud Deck" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.2.11" }, { "version_value": "\u003e= 1.4.0, \u003c 1.4.6" }, { "version_value": "\u003e= 1.5.0, \u003c 1.5.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Deck is a Kanban-style project \u0026 personal management tool for Nextcloud, similar to Trello. The full path of the application is exposed to unauthorized users. It is recommended that the Nextcloud Deck app is upgraded to 1.2.11, 1.4.6, or 1.5.4. There is no workaround available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hx9w-xfrg-2qvp", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hx9w-xfrg-2qvp" }, { "name": "https://github.com/nextcloud/deck/pull/3384", "refsource": "MISC", "url": "https://github.com/nextcloud/deck/pull/3384" }, { "name": "https://hackerone.com/reports/1354334", "refsource": "MISC", "url": "https://hackerone.com/reports/1354334" } ] }, "source": { "advisory": "GHSA-hx9w-xfrg-2qvp", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24906", "datePublished": "2022-05-20T15:40:17", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22469
Vulnerability from cvelistv5
Published
2023-01-10 20:26
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/4196 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq" }, { "name": "https://github.com/nextcloud/deck/pull/4196", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/4196" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. When getting the reference preview for Deck cards the user has no access to, unauthorized user could eventually get the cached data of a user that has access. There are currently no known workarounds. It is recommended that the Nextcloud app Deck is upgraded to 1.8.2.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922: Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-10T20:26:27.108Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8fjp-w9gp-j5hq" }, { "name": "https://github.com/nextcloud/deck/pull/4196", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/4196" } ], "source": { "advisory": "GHSA-8fjp-w9gp-j5hq", "discovery": "UNKNOWN" }, "title": "Nextcloud Deck card vulnerable to data leak to unauthorized users via reference preview cache" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22469", "datePublished": "2023-01-10T20:26:27.108Z", "dateReserved": "2022-12-29T03:00:40.880Z", "dateUpdated": "2024-08-02T10:13:48.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48306
Vulnerability from cvelistv5
Published
2023-11-21 22:20
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/40234 | x_refsource_MISC | |
https://hackerone.com/reports/2115212 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 22.0.0, < 22.2.10.16 Version: >= 23.0.0, < 23.0.12.11 Version: >= 24.0.0, < 24.0.12.7 Version: >= 25.0.0, < 25.0.11 Version: >= 26.0.0, < 26.0.6 Version: >= 27.0.0, < 27.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v" }, { "name": "https://github.com/nextcloud/server/pull/40234", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/40234" }, { "name": "https://hackerone.com/reports/2115212", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2115212" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.16" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.11" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.7" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.11" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T22:20:28.083Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v" }, { "name": "https://github.com/nextcloud/server/pull/40234", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/40234" }, { "name": "https://hackerone.com/reports/2115212", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2115212" } ], "source": { "advisory": "GHSA-8f69-f9jg-4x3v", "discovery": "UNKNOWN" }, "title": "Nextcloud Server DNS pin middleware can be tricked into DNS rebinding allowing SSRF" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48306", "datePublished": "2023-11-21T22:20:28.083Z", "dateReserved": "2023-11-14T17:41:15.572Z", "dateUpdated": "2024-08-02T21:23:39.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29159
Vulnerability from cvelistv5
Published
2022-05-20 15:40
Modified
2024-08-03 06:10
Severity ?
EPSS score ?
Summary
Nextcloud Deck is a Kanban-style project & personal management tool for Nextcloud. In versions prior to 1.4.8, 1.5.6, and 1.6.1, an authenticated user can move stacks with cards from their own board to a board of another user. The Nextcloud Deck app contains a patch for this issue in versions 1.4.8, 1.5.6, and 1.6.1. There are no known currently-known workarounds available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqhf-673w-7r3j | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/3541 | x_refsource_MISC | |
https://hackerone.com/reports/1450117 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.4.8 Version: >= 1.5.0, < 1.5.6 Version: = 1.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqhf-673w-7r3j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/3541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1450117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.4.8" }, { "status": "affected", "version": "\u003e= 1.5.0, \u003c 1.5.6" }, { "status": "affected", "version": "= 1.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Deck is a Kanban-style project \u0026 personal management tool for Nextcloud. In versions prior to 1.4.8, 1.5.6, and 1.6.1, an authenticated user can move stacks with cards from their own board to a board of another user. The Nextcloud Deck app contains a patch for this issue in versions 1.4.8, 1.5.6, and 1.6.1. There are no known currently-known workarounds available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-20T15:40:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqhf-673w-7r3j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/3541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1450117" } ], "source": { "advisory": "GHSA-vqhf-673w-7r3j", "discovery": "UNKNOWN" }, "title": "Possibility for anyone to add a stack with existing tasks on anyone\u0027s board in Nextcloud Deck", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-29159", "STATE": "PUBLIC", "TITLE": "Possibility for anyone to add a stack with existing tasks on anyone\u0027s board in Nextcloud Deck" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.4.8" }, { "version_value": "\u003e= 1.5.0, \u003c 1.5.6" }, { "version_value": "= 1.6.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Deck is a Kanban-style project \u0026 personal management tool for Nextcloud. In versions prior to 1.4.8, 1.5.6, and 1.6.1, an authenticated user can move stacks with cards from their own board to a board of another user. The Nextcloud Deck app contains a patch for this issue in versions 1.4.8, 1.5.6, and 1.6.1. There are no known currently-known workarounds available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639: Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqhf-673w-7r3j", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqhf-673w-7r3j" }, { "name": "https://github.com/nextcloud/deck/pull/3541", "refsource": "MISC", "url": "https://github.com/nextcloud/deck/pull/3541" }, { "name": "https://hackerone.com/reports/1450117", "refsource": "MISC", "url": "https://hackerone.com/reports/1450117" } ] }, "source": { "advisory": "GHSA-vqhf-673w-7r3j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29159", "datePublished": "2022-05-20T15:40:10", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:10:59.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41241
Vulnerability from cvelistv5
Published
2022-03-08 18:25
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94 | x_refsource_CONFIRM | |
https://github.com/nextcloud/groupfolders/issues/1692 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/29362 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.14 Version: >= 21.0.0, < 21.0.6 Version: >= 22.2.0, < 22.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/groupfolders/issues/1692" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/29362" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.14" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.6" }, { "status": "affected", "version": "\u003e= 22.2.0, \u003c 22.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting \"advanced permissions\" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the \"groupfolders\" application in the admin settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:07:53", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/groupfolders/issues/1692" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/29362" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-m4wp-r357-4q94", "discovery": "UNKNOWN" }, "title": "Advanced permissions is not respected for subfolders in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41241", "STATE": "PUBLIC", "TITLE": "Advanced permissions is not respected for subfolders in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.14" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.6" }, { "version_value": "\u003e= 22.2.0, \u003c 22.2.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting \"advanced permissions\" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the \"groupfolders\" application in the admin settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94" }, { "name": "https://github.com/nextcloud/groupfolders/issues/1692", "refsource": "MISC", "url": "https://github.com/nextcloud/groupfolders/issues/1692" }, { "name": "https://github.com/nextcloud/server/pull/29362", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/29362" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-m4wp-r357-4q94", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41241", "datePublished": "2022-03-08T18:25:10", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22213
Vulnerability from cvelistv5
Published
2024-01-18 19:11
Modified
2024-11-13 19:21
Severity ?
EPSS score ?
Summary
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions users could be tricked into executing malicious code that would execute in their browser via HTML sent as a comment. It is recommended that the Nextcloud Deck is upgraded to version 1.9.5 or 1.11.2. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mg7w-x9fm-9wwc | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd | x_refsource_MISC | |
https://hackerone.com/reports/2058556 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.9.0, < 1.9.5 Version: >= 1.10.0, < 1.11.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mg7w-x9fm-9wwc", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mg7w-x9fm-9wwc" }, { "name": "https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd" }, { "name": "https://hackerone.com/reports/2058556", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2058556" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22213", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T19:19:37.882732Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T19:21:11.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.9.0, \u003c 1.9.5" }, { "status": "affected", "version": "\u003e= 1.10.0, \u003c 1.11.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions users could be tricked into executing malicious code that would execute in their browser via HTML sent as a comment. It is recommended that the Nextcloud Deck is upgraded to version 1.9.5 or 1.11.2. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T19:11:40.584Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mg7w-x9fm-9wwc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mg7w-x9fm-9wwc" }, { "name": "https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd" }, { "name": "https://hackerone.com/reports/2058556", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2058556" } ], "source": { "advisory": "GHSA-mg7w-x9fm-9wwc", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting when sending HTML as a comment in the Nextcloud Deck app" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22213", "datePublished": "2024-01-18T19:11:40.584Z", "dateReserved": "2024-01-08T04:59:27.374Z", "dateUpdated": "2024-11-13T19:21:11.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49791
Vulnerability from cvelistv5
Published
2023-12-22 16:26
Modified
2024-09-12 12:36
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/41520 | x_refsource_MISC | |
https://hackerone.com/reports/2120667 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 23.0.0, < 23.0.12.13 Version: >= 24.0.0, < 24.0.12.9 Version: >= 25.0.0, < 25.0.13.4 Version: >= 26.0.0, < 26.0.9 Version: >= 27.0.0, < 27.1.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr" }, { "name": "https://github.com/nextcloud/server/pull/41520", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/41520" }, { "name": "https://hackerone.com/reports/2120667", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2120667" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49791", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-27T18:16:58.219303Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T12:36:45.577Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.13" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.9" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.13.4" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.9" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-22T16:26:28.076Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr" }, { "name": "https://github.com/nextcloud/server/pull/41520", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/41520" }, { "name": "https://hackerone.com/reports/2120667", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2120667" } ], "source": { "advisory": "GHSA-3f8p-6qww-2prr", "discovery": "UNKNOWN" }, "title": "Workflows do not require password confirmation on API level" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49791", "datePublished": "2023-12-22T16:26:28.076Z", "dateReserved": "2023-11-30T13:39:50.863Z", "dateUpdated": "2024-09-12T12:36:45.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52520
Vulnerability from cvelistv5
Published
2024-11-15 16:41
Modified
2024-11-15 17:01
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxqf-cfxw-mqmj | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/47627 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/873c42b0f1383d5b6f2b7a481e1d9620ed30f44a | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.10 Version: >= 29.0.0, < 29.0.7 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52520", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:00:01.088749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:01:01.172Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.10" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:41:42.412Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxqf-cfxw-mqmj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxqf-cfxw-mqmj" }, { "name": "https://github.com/nextcloud/server/pull/47627", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/47627" }, { "name": "https://github.com/nextcloud/server/commit/873c42b0f1383d5b6f2b7a481e1d9620ed30f44a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/873c42b0f1383d5b6f2b7a481e1d9620ed30f44a" } ], "source": { "advisory": "GHSA-pxqf-cfxw-mqmj", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s link reference provider can be tricked into downloading bigger files than intended" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52520", "datePublished": "2024-11-15T16:41:42.412Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T17:01:01.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28848
Vulnerability from cvelistv5
Published
2023-04-04 12:38
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
user_oidc is the OIDC connect user backend for Nextcloud, an open source collaboration platform. A vulnerability in versions 1.0.0 until 1.3.0 effectively allowed an attacker to bypass the state protection as they could just copy the expected state token from the first request to their second request. Users should upgrade user_oidc to 1.3.0 to receive a patch for the issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/pull/580 | x_refsource_MISC | |
https://hackerone.com/reports/1878381 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.0.0, < 1.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f" }, { "name": "https://github.com/nextcloud/user_oidc/pull/580", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/580" }, { "name": "https://hackerone.com/reports/1878381", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1878381" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.0.0, \u003c 1.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc is the OIDC connect user backend for Nextcloud, an open source collaboration platform. A vulnerability in versions 1.0.0 until 1.3.0 effectively allowed an attacker to bypass the state protection as they could just copy the expected state token from the first request to their second request. Users should upgrade user_oidc to 1.3.0 to receive a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-04T12:38:31.201Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f" }, { "name": "https://github.com/nextcloud/user_oidc/pull/580", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/pull/580" }, { "name": "https://hackerone.com/reports/1878381", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1878381" } ], "source": { "advisory": "GHSA-52hv-xw32-wf7f", "discovery": "UNKNOWN" }, "title": "CSRF protection on user_oidc login returned the expected token in case of an error" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28848", "datePublished": "2023-04-04T12:38:31.201Z", "dateReserved": "2023-03-24T16:25:34.467Z", "dateUpdated": "2024-08-02T13:51:38.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37617
Vulnerability from cvelistv5
Published
2021-08-18 17:25
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\` system folder and verify that there is no malicious `C:\Uninstall.exe` file on the system.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q2w-v879-q24v | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/3497 | x_refsource_MISC | |
https://hackerone.com/reports/1240749 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.3 , <= 3.2.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.309Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q2w-v879-q24v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/3497" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1240749" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.3 , \u003c= 3.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\\` system folder and verify that there is no malicious `C:\\Uninstall.exe` file on the system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-18T17:25:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q2w-v879-q24v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/3497" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1240749" } ], "source": { "advisory": "GHSA-6q2w-v879-q24v", "discovery": "UNKNOWN" }, "title": "Untrusted Search Path in Nextcloud Desktop Client", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37617", "STATE": "PUBLIC", "TITLE": "Untrusted Search Path in Nextcloud Desktop Client" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003e= 3.0.3 , \u003c= 3.2.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\\` system folder and verify that there is no malicious `C:\\Uninstall.exe` file on the system." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-426: Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q2w-v879-q24v", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q2w-v879-q24v" }, { "name": "https://github.com/nextcloud/desktop/pull/3497", "refsource": "MISC", "url": "https://github.com/nextcloud/desktop/pull/3497" }, { "name": "https://hackerone.com/reports/1240749", "refsource": "MISC", "url": "https://hackerone.com/reports/1240749" } ] }, "source": { "advisory": "GHSA-6q2w-v879-q24v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37617", "datePublished": "2021-08-18T17:25:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28834
Vulnerability from cvelistv5
Published
2023-04-03 16:19
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud Server is an open source personal cloud server. Nextcloud Server 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4, have an information disclosure vulnerability. A user was able to get the full data directory path of the Nextcloud server from an API endpoint. By itself this information is not problematic as it can also be guessed for most common setups, but it could speed up other unknown attacks in the future if the information is known. Nextcloud Server 24.0.6 and 25.0.4 and Nextcloud Enterprise Server 23.0.11, 24.0.6, and 25.0.4 contain patches for this issue. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/issues/33883 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/36094 | x_refsource_MISC | |
https://hackerone.com/reports/1690510 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 23.0.0, < 23.0.14 Version: >= 24.0.0, < 24.0.10 Version: >= 25.0.0, < 25.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv" }, { "name": "https://github.com/nextcloud/server/issues/33883", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/issues/33883" }, { "name": "https://github.com/nextcloud/server/pull/36094", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36094" }, { "name": "https://hackerone.com/reports/1690510", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1690510" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.14" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.10" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is an open source personal cloud server. Nextcloud Server 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4, have an information disclosure vulnerability. A user was able to get the full data directory path of the Nextcloud server from an API endpoint. By itself this information is not problematic as it can also be guessed for most common setups, but it could speed up other unknown attacks in the future if the information is known. Nextcloud Server 24.0.6 and 25.0.4 and Nextcloud Enterprise Server 23.0.11, 24.0.6, and 25.0.4 contain patches for this issue. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-03T16:19:48.382Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv" }, { "name": "https://github.com/nextcloud/server/issues/33883", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/issues/33883" }, { "name": "https://github.com/nextcloud/server/pull/36094", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36094" }, { "name": "https://hackerone.com/reports/1690510", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1690510" } ], "source": { "advisory": "GHSA-5w64-6c42-rgcv", "discovery": "UNKNOWN" }, "title": "Full path of data directory exposed to Nextcloud server users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28834", "datePublished": "2023-04-03T16:19:48.382Z", "dateReserved": "2023-03-24T16:25:34.465Z", "dateUpdated": "2024-08-02T13:51:38.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41177
Vulnerability from cvelistv5
Published
2021-10-25 21:50
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/28728 | x_refsource_MISC | |
https://hackerone.com/reports/1265709 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.13 Version: >= 21.0.0, < 21.0.5 Version: < 22.2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28728" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1265709" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.13" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.5" }, { "status": "affected", "version": "\u003c 22.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799: Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:08:05", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28728" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1265709" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-fj39-4qx4-m3f2", "discovery": "UNKNOWN" }, "title": "Rate-limits not working on instances without configured memory cache backend", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41177", "STATE": "PUBLIC", "TITLE": "Rate-limits not working on instances without configured memory cache backend" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.13" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.5" }, { "version_value": "\u003c 22.2.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-799: Improper Control of Interaction Frequency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2" }, { "name": "https://github.com/nextcloud/server/pull/28728", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28728" }, { "name": "https://hackerone.com/reports/1265709", "refsource": "MISC", "url": "https://hackerone.com/reports/1265709" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-fj39-4qx4-m3f2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41177", "datePublished": "2021-10-25T21:50:11", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35928
Vulnerability from cvelistv5
Published
2023-06-23 20:58
Modified
2024-12-05 16:18
Severity ?
EPSS score ?
Summary
Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2.
Three workarounds are available. Disable app files_external. Change config setting "Allow users to mount external storage" to disabled in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages`. Change config setting to disallow users to create external storages in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages` with the types FTP, Nextcloud, SFTP, and/or WebDAV.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38265 | x_refsource_MISC | |
https://hackerone.com/reports/1978882 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: Nextcloud Enterprise Server >= 19.0.0, < 19.0.13.9 Version: Nextcloud Enterprise Server >= 20.0.0.0, < 20.0.14.14 Version: Nextcloud Enterprise Server >= 21.0.0.0, < 21.0.9.12 Version: Nextcloud Enterprise Server >= 22.0.0.0, < 22.2.10.12 Version: Nextcloud Enterprise Server >= 23.0.0.0, < 23.0.12.7 Version: Nextcloud Enterprise Server >= 24.0.0.0, < 24.0.12.2 Version: Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 Version: Nextcloud Enterprise Server >= 26.0.0, < 26.0.2 Version: Nextcloud Server >= 25.0.0, < 25.0.7 Version: Nextcloud Server >= 26.0.0, < 26.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:40.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h" }, { "name": "https://github.com/nextcloud/server/pull/38265", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38265" }, { "name": "https://hackerone.com/reports/1978882", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1978882" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35928", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T16:18:00.553586Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T16:18:09.131Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 19.0.0, \u003c 19.0.13.9" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 20.0.0.0, \u003c 20.0.14.14" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 21.0.0.0, \u003c 21.0.9.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 22.0.0.0, \u003c 22.2.10.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 23.0.0.0, \u003c 23.0.12.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 24.0.0.0, \u003c 24.0.12.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 25.0.0, \u003c 25.0.7 " }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 26.0.0, \u003c 26.0.2" }, { "status": "affected", "version": "Nextcloud Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Server \u003e= 26.0.0, \u003c 26.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2.\n\nThree workarounds are available. Disable app files_external. Change config setting \"Allow users to mount external storage\" to disabled in \"Administration\" \u003e \"External storage\" settings `\u2026/index.php/settings/admin/externalstorages`. Change config setting to disallow users to create external storages in \"Administration\" \u003e \"External storage\" settings `\u2026/index.php/settings/admin/externalstorages` with the types FTP, Nextcloud, SFTP, and/or WebDAV." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-274", "description": "CWE-274: Improper Handling of Insufficient Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T20:58:33.225Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h" }, { "name": "https://github.com/nextcloud/server/pull/38265", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38265" }, { "name": "https://hackerone.com/reports/1978882", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1978882" } ], "source": { "advisory": "GHSA-637g-xp2c-qh5h", "discovery": "UNKNOWN" }, "title": "Nextcloud user scoped external storage can be used to gather credentials of other users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35928", "datePublished": "2023-06-23T20:58:33.225Z", "dateReserved": "2023-06-20T14:02:45.593Z", "dateUpdated": "2024-12-05T16:18:09.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29160
Vulnerability from cvelistv5
Published
2022-05-20 15:55
Modified
2024-08-03 06:10
Severity ?
EPSS score ?
Summary
Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder's information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xcj9-3jch-qr2r | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/9644 | x_refsource_MISC | |
https://hackerone.com/reports/1222873 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.19.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xcj9-3jch-qr2r" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/9644" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1222873" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.19.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder\u0027s information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-20T15:55:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xcj9-3jch-qr2r" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/9644" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1222873" } ], "source": { "advisory": "GHSA-xcj9-3jch-qr2r", "discovery": "UNKNOWN" }, "title": "Sensitive files/data exist after deletion of user account in Nextcloud Android", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-29160", "STATE": "PUBLIC", "TITLE": "Sensitive files/data exist after deletion of user account in Nextcloud Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.19.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder\u0027s information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xcj9-3jch-qr2r", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xcj9-3jch-qr2r" }, { "name": "https://github.com/nextcloud/android/pull/9644", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/9644" }, { "name": "https://hackerone.com/reports/1222873", "refsource": "MISC", "url": "https://hackerone.com/reports/1222873" } ] }, "source": { "advisory": "GHSA-xcj9-3jch-qr2r", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29160", "datePublished": "2022-05-20T15:55:10", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:10:59.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39220
Vulnerability from cvelistv5
Published
2021-10-25 18:55
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform The Nextcloud Mail application prior to versions 1.10.4 and 1.11.0 does by default not render images in emails to not leak the read state or user IP. The privacy filter failed to filter images with a relative protocol. It is recommended that the Nextcloud Mail application is upgraded to 1.10.4 or 1.11.0. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/5470 | x_refsource_MISC | |
https://hackerone.com/reports/1308147 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.10.4, < 1.11.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/5470" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1308147" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.10.4, \u003c 1.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform The Nextcloud Mail application prior to versions 1.10.4 and 1.11.0 does by default not render images in emails to not leak the read state or user IP. The privacy filter failed to filter images with a relative protocol. It is recommended that the Nextcloud Mail application is upgraded to 1.10.4 or 1.11.0. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T18:55:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/5470" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1308147" } ], "source": { "advisory": "GHSA-6q9v-wm8r-rcv5", "discovery": "UNKNOWN" }, "title": "Bypass of image blocking in Nextcloud Mail", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39220", "STATE": "PUBLIC", "TITLE": "Bypass of image blocking in Nextcloud Mail" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.10.4, \u003c 1.11.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform The Nextcloud Mail application prior to versions 1.10.4 and 1.11.0 does by default not render images in emails to not leak the read state or user IP. The privacy filter failed to filter images with a relative protocol. It is recommended that the Nextcloud Mail application is upgraded to 1.10.4 or 1.11.0. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6q9v-wm8r-rcv5" }, { "name": "https://github.com/nextcloud/mail/pull/5470", "refsource": "MISC", "url": "https://github.com/nextcloud/mail/pull/5470" }, { "name": "https://hackerone.com/reports/1308147", "refsource": "MISC", "url": "https://hackerone.com/reports/1308147" } ] }, "source": { "advisory": "GHSA-6q9v-wm8r-rcv5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39220", "datePublished": "2021-10-25T18:55:14", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32766
Vulnerability from cvelistv5
Published
2021-09-07 21:05
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/1716 | x_refsource_MISC | |
https://hackerone.com/reports/1253475 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.12 Version: >= 21.0.0, < 21.0.4 Version: >= 22.0.0, < 22.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/1716" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1253475" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.12" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.4" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209: Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-07T21:05:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/1716" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1253475" } ], "source": { "advisory": "GHSA-gcf3-3wmc-88jr", "discovery": "UNKNOWN" }, "title": "Nextcloud Text app can disclose existence of folders in \"File Drop\" link share", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32766", "STATE": "PUBLIC", "TITLE": "Nextcloud Text app can disclose existence of folders in \"File Drop\" link share" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.12" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.4" }, { "version_value": "\u003e= 22.0.0, \u003c 22.0.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-209: Generation of Error Message Containing Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr" }, { "name": "https://github.com/nextcloud/text/pull/1716", "refsource": "MISC", "url": "https://github.com/nextcloud/text/pull/1716" }, { "name": "https://hackerone.com/reports/1253475", "refsource": "MISC", "url": "https://hackerone.com/reports/1253475" } ] }, "source": { "advisory": "GHSA-gcf3-3wmc-88jr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32766", "datePublished": "2021-09-07T21:05:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52511
Vulnerability from cvelistv5
Published
2024-11-15 17:22
Modified
2024-11-15 18:22
Severity ?
EPSS score ?
Summary
Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4qqp-9h2g-7qg7 | x_refsource_CONFIRM | |
https://github.com/nextcloud/tables/pull/1351 | x_refsource_MISC | |
https://github.com/nextcloud/tables/commit/52846ad81fe192ee977f14c82a229b0d9cdc406c | x_refsource_MISC | |
https://hackerone.com/reports/2671404 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 0.6.0, < 0.8.0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52511", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:21:55.752494Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:22:09.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 0.6.0, \u003c 0.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:22:41.184Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4qqp-9h2g-7qg7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4qqp-9h2g-7qg7" }, { "name": "https://github.com/nextcloud/tables/pull/1351", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/tables/pull/1351" }, { "name": "https://github.com/nextcloud/tables/commit/52846ad81fe192ee977f14c82a229b0d9cdc406c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/tables/commit/52846ad81fe192ee977f14c82a229b0d9cdc406c" }, { "name": "https://hackerone.com/reports/2671404", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2671404" } ], "source": { "advisory": "GHSA-4qqp-9h2g-7qg7", "discovery": "UNKNOWN" }, "title": "Nextcloud Tables has an Authorization Bypass Through User-Controlled Key in Tables" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52511", "datePublished": "2024-11-15T17:22:41.184Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T18:22:09.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52507
Vulnerability from cvelistv5
Published
2024-11-15 17:24
Modified
2024-11-15 18:21
Severity ?
EPSS score ?
Summary
Nextcloud Tables allows users to to create tables with individual columns. The information which Table (numeric ID) is shared with which groups and users and the respective permissions was not limited to affected users. It is recommended that the Nextcloud Tables app is upgraded to 0.8.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rgvc-xr2w-qq45 | x_refsource_CONFIRM | |
https://github.com/nextcloud/tables/pull/1406 | x_refsource_MISC | |
https://github.com/nextcloud/tables/commit/13ca45f1b9f70f694aea81b78bc7416ec840c332 | x_refsource_MISC | |
https://hackerone.com/reports/2705507 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 0.3.0, < 0.8.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52507", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:20:54.777901Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:21:07.458Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 0.3.0, \u003c 0.8.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Tables allows users to to create tables with individual columns. The information which Table (numeric ID) is shared with which groups and users and the respective permissions was not limited to affected users. It is recommended that the Nextcloud Tables app is upgraded to 0.8.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:24:50.173Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rgvc-xr2w-qq45", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rgvc-xr2w-qq45" }, { "name": "https://github.com/nextcloud/tables/pull/1406", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/tables/pull/1406" }, { "name": "https://github.com/nextcloud/tables/commit/13ca45f1b9f70f694aea81b78bc7416ec840c332", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/tables/commit/13ca45f1b9f70f694aea81b78bc7416ec840c332" }, { "name": "https://hackerone.com/reports/2705507", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2705507" } ], "source": { "advisory": "GHSA-rgvc-xr2w-qq45", "discovery": "UNKNOWN" }, "title": "Share information of the Nextcloud Tables app is not limited to affected users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52507", "datePublished": "2024-11-15T17:24:50.173Z", "dateReserved": "2024-11-11T18:49:23.557Z", "dateUpdated": "2024-11-15T18:21:07.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39334
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud also ships a CLI utility called nextcloudcmd which is sometimes used for automated scripting and headless servers. Versions of nextcloudcmd prior to 3.6.1 would incorrectly trust invalid TLS certificates, which may enable a Man-in-the-middle attack that exposes sensitive data or credentials to a network attacker. This affects the CLI only. It does not affect the standard GUI desktop Nextcloud clients, and it does not affect the Nextcloud server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/issues/4927" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5022" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1699740" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud also ships a CLI utility called nextcloudcmd which is sometimes used for automated scripting and headless servers. Versions of nextcloudcmd prior to 3.6.1 would incorrectly trust invalid TLS certificates, which may enable a Man-in-the-middle attack that exposes sensitive data or credentials to a network attacker. This affects the CLI only. It does not affect the standard GUI desktop Nextcloud clients, and it does not affect the Nextcloud server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-06T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv" }, { "url": "https://github.com/nextcloud/desktop/issues/4927" }, { "url": "https://github.com/nextcloud/desktop/pull/5022" }, { "url": "https://hackerone.com/reports/1699740" } ], "source": { "advisory": "GHSA-82xx-98xv-4jxv", "discovery": "UNKNOWN" }, "title": "nextcloudcmd incorrectly trusts bad TLS certificates" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39334", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35931
Vulnerability from cvelistv5
Published
2022-09-06 18:10
Modified
2024-08-03 09:51
Severity ?
EPSS score ?
Summary
Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the validator itself would block. Upgrade Nextcloud Server to 22.2.10, 23.0.7 or 24.0.3 to receive a patch for the issue in Password Policy. There are no known workarounds available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c7mw-9q4r-8qwr | x_refsource_CONFIRM | |
https://github.com/nextcloud/password_policy/pull/363 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.0, < 24.0.3 Version: < 22.2.10 Version: >= 23.0.0, < 23.0.7 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:51:59.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c7mw-9q4r-8qwr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/password_policy/pull/363" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.3" }, { "status": "affected", "version": "\u003c 22.2.10" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the validator itself would block. Upgrade Nextcloud Server to 22.2.10, 23.0.7 or 24.0.3 to receive a patch for the issue in Password Policy. There are no known workarounds available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-261", "description": "CWE-261: Weak Encoding for Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-06T18:10:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c7mw-9q4r-8qwr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/password_policy/pull/363" } ], "source": { "advisory": "GHSA-c7mw-9q4r-8qwr", "discovery": "UNKNOWN" }, "title": "Nextcloud Password Policy\u0027s generated passwords are not fully validated by HIBPValidator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-35931", "STATE": "PUBLIC", "TITLE": "Nextcloud Password Policy\u0027s generated passwords are not fully validated by HIBPValidator" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003e= 24.0.0, \u003c 24.0.3" }, { "version_value": "\u003c 22.2.10" }, { "version_value": "\u003e= 23.0.0, \u003c 23.0.7" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the validator itself would block. Upgrade Nextcloud Server to 22.2.10, 23.0.7 or 24.0.3 to receive a patch for the issue in Password Policy. There are no known workarounds available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-261: Weak Encoding for Password" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c7mw-9q4r-8qwr", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c7mw-9q4r-8qwr" }, { "name": "https://github.com/nextcloud/password_policy/pull/363", "refsource": "MISC", "url": "https://github.com/nextcloud/password_policy/pull/363" } ] }, "source": { "advisory": "GHSA-c7mw-9q4r-8qwr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-35931", "datePublished": "2022-09-06T18:10:09", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:51:59.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32802
Vulnerability from cvelistv5
Published
2021-09-07 21:45
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn't suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1261413 | x_refsource_MISC | |
https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.12 Version: >= 21.0.0, < 21.0.4 Version: >= 22.0.0, < 22.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1261413" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.12" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.4" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-829", "description": "CWE-829: Inclusion of Functionality from Untrusted Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:10:42", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1261413" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-m682-v4g9-wrq7", "discovery": "UNKNOWN" }, "title": "Preview generation used third-party library not suited for user-generated content in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32802", "STATE": "PUBLIC", "TITLE": "Preview generation used third-party library not suited for user-generated content in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.12" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.4" }, { "version_value": "\u003e= 22.0.0, \u003c 22.1.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-829: Inclusion of Functionality from Untrusted Control Sphere" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7" }, { "name": "https://hackerone.com/reports/1261413", "refsource": "MISC", "url": "https://hackerone.com/reports/1261413" }, { "name": "https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews", "refsource": "MISC", "url": "https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-m682-v4g9-wrq7", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32802", "datePublished": "2021-09-07T21:45:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31120
Vulnerability from cvelistv5
Published
2022-08-04 17:00
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655 | x_refsource_MISC | |
https://portal.nextcloud.com/article/using-the-audit-log-44.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 23.0.0, < 23.0.4 Version: < 22.2.7 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.nextcloud.com/article/using-the-audit-log-44.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.4" }, { "status": "affected", "version": "\u003c 22.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 2.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-778", "description": "CWE-778: Insufficient Logging", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T17:00:24", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portal.nextcloud.com/article/using-the-audit-log-44.html" } ], "source": { "advisory": "GHSA-9qvg-7fwg-722x", "discovery": "UNKNOWN" }, "title": "Federated share accepting/declining is not logged in audit log in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31120", "STATE": "PUBLIC", "TITLE": "Federated share accepting/declining is not logged in audit log in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003e= 23.0.0, \u003c 23.0.4" }, { "version_value": "\u003c 22.2.7" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "NONE", "baseScore": 2.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-778: Insufficient Logging" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x" }, { "name": "https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655" }, { "name": "https://portal.nextcloud.com/article/using-the-audit-log-44.html", "refsource": "MISC", "url": "https://portal.nextcloud.com/article/using-the-audit-log-44.html" } ] }, "source": { "advisory": "GHSA-9qvg-7fwg-722x", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31120", "datePublished": "2022-08-04T17:00:24", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41179
Vulnerability from cvelistv5
Published
2021-10-25 22:00
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/28725 | x_refsource_MISC | |
https://hackerone.com/reports/1322865 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.13 Version: >= 21.0.0, < 21.0.5 Version: < 22.2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28725" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1322865" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.13" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.5" }, { "status": "affected", "version": "\u003c 22.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-304", "description": "CWE-304: Missing Critical Step in Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T22:00:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28725" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1322865" } ], "source": { "advisory": "GHSA-7hvh-rc6f-px23", "discovery": "UNKNOWN" }, "title": "Two-Factor Authentication not enforced for pages marked as public", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41179", "STATE": "PUBLIC", "TITLE": "Two-Factor Authentication not enforced for pages marked as public" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.13" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.5" }, { "version_value": "\u003c 22.2.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-304: Missing Critical Step in Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23" }, { "name": "https://github.com/nextcloud/server/pull/28725", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28725" }, { "name": "https://hackerone.com/reports/1322865", "refsource": "MISC", "url": "https://hackerone.com/reports/1322865" } ] }, "source": { "advisory": "GHSA-7hvh-rc6f-px23", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41179", "datePublished": "2021-10-25T22:00:13", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39210
Vulnerability from cvelistv5
Published
2022-09-16 23:10
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw2w-gpcv-v39f | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/10544 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.21.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:42.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw2w-gpcv-v39f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/10544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.21.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T23:10:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw2w-gpcv-v39f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/10544" } ], "source": { "advisory": "GHSA-vw2w-gpcv-v39f", "discovery": "UNKNOWN" }, "title": "Access to internal files of the Nextcloud Android app", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-39210", "STATE": "PUBLIC", "TITLE": "Access to internal files of the Nextcloud Android app" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.21.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw2w-gpcv-v39f", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw2w-gpcv-v39f" }, { "name": "https://github.com/nextcloud/android/pull/10544", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/10544" } ] }, "source": { "advisory": "GHSA-vw2w-gpcv-v39f", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39210", "datePublished": "2022-09-16T23:10:15", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:42.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32703
Vulnerability from cvelistv5
Published
2021-07-12 15:25
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the shareinfo endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/26945 | x_refsource_MISC | |
https://hackerone.com/reports/1173684 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/26945" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1173684" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the shareinfo endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799: Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:10:29", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/26945" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1173684" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-375p-cxxq-gc9p", "discovery": "UNKNOWN" }, "title": "Lack of ratelimit on shareinfo endpoint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32703", "STATE": "PUBLIC", "TITLE": "Lack of ratelimit on shareinfo endpoint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the shareinfo endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-799: Improper Control of Interaction Frequency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p" }, { "name": "https://github.com/nextcloud/server/pull/26945", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/26945" }, { "name": "https://hackerone.com/reports/1173684", "refsource": "MISC", "url": "https://hackerone.com/reports/1173684" }, { "name": "FEDORA-2021-9b421b78af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-375p-cxxq-gc9p", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32703", "datePublished": "2021-07-12T15:25:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32782
Vulnerability from cvelistv5
Published
2021-09-07 20:00
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application is vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Circles application is upgraded to 0.21.3, 0.20.10 or 0.19.14 to resolve this issue. As a workaround users may use a browser that has support for Content-Security-Policy. A notable exemption is Internet Explorer which does not support CSP properly.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hgpq-28gj-jrj9 | x_refsource_CONFIRM | |
https://github.com/nextcloud/circles/commit/dbb97a83ccb342c839a54f088aa19b8ba6844b0e | x_refsource_MISC | |
https://hackerone.com/reports/1217606 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 0.19.1 Version: >= 0.20.0, < 0.20.10 Version: >= 0.21.0, < 0.21.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hgpq-28gj-jrj9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/circles/commit/dbb97a83ccb342c839a54f088aa19b8ba6844b0e" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1217606" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 0.19.1" }, { "status": "affected", "version": "\u003e= 0.20.0, \u003c 0.20.10" }, { "status": "affected", "version": "\u003e= 0.21.0, \u003c 0.21.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application is vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Circles application is upgraded to 0.21.3, 0.20.10 or 0.19.14 to resolve this issue. As a workaround users may use a browser that has support for Content-Security-Policy. A notable exemption is Internet Explorer which does not support CSP properly." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-07T20:00:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hgpq-28gj-jrj9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/circles/commit/dbb97a83ccb342c839a54f088aa19b8ba6844b0e" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1217606" } ], "source": { "advisory": "GHSA-hgpq-28gj-jrj9", "discovery": "UNKNOWN" }, "title": "Cross-Site Scripting in Nextcloud Circles", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32782", "STATE": "PUBLIC", "TITLE": "Cross-Site Scripting in Nextcloud Circles" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 0.19.1" }, { "version_value": "\u003e= 0.20.0, \u003c 0.20.10" }, { "version_value": "\u003e= 0.21.0, \u003c 0.21.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application is vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Circles application is upgraded to 0.21.3, 0.20.10 or 0.19.14 to resolve this issue. As a workaround users may use a browser that has support for Content-Security-Policy. A notable exemption is Internet Explorer which does not support CSP properly." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hgpq-28gj-jrj9", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hgpq-28gj-jrj9" }, { "name": "https://github.com/nextcloud/circles/commit/dbb97a83ccb342c839a54f088aa19b8ba6844b0e", "refsource": "MISC", "url": "https://github.com/nextcloud/circles/commit/dbb97a83ccb342c839a54f088aa19b8ba6844b0e" }, { "name": "https://hackerone.com/reports/1217606", "refsource": "MISC", "url": "https://hackerone.com/reports/1217606" } ] }, "source": { "advisory": "GHSA-hgpq-28gj-jrj9", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32782", "datePublished": "2021-09-07T20:00:19", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45148
Vulnerability from cvelistv5
Published
2023-10-16 18:51
Modified
2024-09-16 14:50
Severity ?
EPSS score ?
Summary
Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\Redis` and install Redis instead of Memcached.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/40293 | x_refsource_MISC | |
https://hackerone.com/reports/2110945 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.11 Version: >= 26.0.0, < 26.0.6 Version: >= 27.0.0, < 27.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:18.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63" }, { "name": "https://github.com/nextcloud/server/pull/40293", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/40293" }, { "name": "https://hackerone.com/reports/2110945", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2110945" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T14:48:15.335096Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:50:57.166Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.11" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\\OC\\Memcache\\Redis` and install Redis instead of Memcached." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T18:51:56.827Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63" }, { "name": "https://github.com/nextcloud/server/pull/40293", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/40293" }, { "name": "https://hackerone.com/reports/2110945", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2110945" } ], "source": { "advisory": "GHSA-xmhp-7vr4-hp63", "discovery": "UNKNOWN" }, "title": "Rate limiter not working reliable when Memcached is installed in Nextcloud" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-45148", "datePublished": "2023-10-16T18:51:56.827Z", "dateReserved": "2023-10-04T16:02:46.330Z", "dateUpdated": "2024-09-16T14:50:57.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32726
Vulnerability from cvelistv5
Published
2021-07-12 19:45
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain access to their account. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/27532 | x_refsource_MISC | |
https://hackerone.com/reports/1202590 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/27532" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1202590" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain access to their account. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-708", "description": "CWE-708: Incorrect Ownership Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:09:37", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/27532" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1202590" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-6qr9-c846-j8mg", "discovery": "UNKNOWN" }, "title": "Webauthn tokens not removed after user has been deleted", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32726", "STATE": "PUBLIC", "TITLE": "Webauthn tokens not removed after user has been deleted" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain access to their account. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-708: Incorrect Ownership Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg" }, { "name": "https://github.com/nextcloud/server/pull/27532", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/27532" }, { "name": "https://hackerone.com/reports/1202590", "refsource": "MISC", "url": "https://hackerone.com/reports/1202590" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-6qr9-c846-j8mg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32726", "datePublished": "2021-07-12T19:45:13", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25821
Vulnerability from cvelistv5
Published
2023-02-24 23:39
Modified
2024-08-02 11:32
Severity ?
EPSS score ?
Summary
Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/34502 | x_refsource_MISC | |
https://hackerone.com/reports/1724016 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.4, < 24.0.7 Version: >= 25.0.0, < 25.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94" }, { "name": "https://github.com/nextcloud/server/pull/34502", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34502" }, { "name": "https://hackerone.com/reports/1724016", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1724016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.4, \u003c 24.0.7" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-24T23:39:51.684Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94" }, { "name": "https://github.com/nextcloud/server/pull/34502", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/34502" }, { "name": "https://hackerone.com/reports/1724016", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1724016" } ], "source": { "advisory": "GHSA-7w6h-5qgw-4j94", "discovery": "UNKNOWN" }, "title": "Nextcloud download permissions can be changed by resharer" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25821", "datePublished": "2023-02-24T23:39:51.684Z", "dateReserved": "2023-02-15T16:34:48.774Z", "dateUpdated": "2024-08-02T11:32:12.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25150
Vulnerability from cvelistv5
Published
2023-02-08 19:15
Modified
2024-08-02 11:18
Severity ?
EPSS score ?
Summary
Nextcloud office/richdocuments is an office suit for the nextcloud server platform. In affected versions the Collabora integration can be tricked to provide access to any file without proper permission validation. As a result any user with access to Collabora can obtain the content of other users files. It is recommended that the Nextcloud Office App (Collabora Integration) is updated to 7.0.2 (Nextcloud 25), 6.3.2 (Nextcloud 24), 5.0.10 (Nextcloud 23), 4.2.9 (Nextcloud 21-22), or 3.8.7 (Nextcloud 15-20). There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64xc-r58v-53gj | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/2669 | x_refsource_MISC | |
https://hackerone.com/reports/1788222 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.8.7 Version: >= 4.0.0, < 4.2.9 Version: >= 5.0.0, < 5.0.10 Version: >= 6.0.0, < 6.3.2 Version: >= 7.0.0, < 7.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64xc-r58v-53gj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64xc-r58v-53gj" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2669", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/2669" }, { "name": "https://hackerone.com/reports/1788222", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1788222" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.8.7" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.2.9" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.0.10" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.3.2" }, { "status": "affected", "version": "\u003e= 7.0.0, \u003c 7.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud office/richdocuments is an office suit for the nextcloud server platform. In affected versions the Collabora integration can be tricked to provide access to any file without proper permission validation. As a result any user with access to Collabora can obtain the content of other users files. It is recommended that the Nextcloud Office App (Collabora Integration) is updated to 7.0.2 (Nextcloud 25), 6.3.2 (Nextcloud 24), 5.0.10 (Nextcloud 23), 4.2.9 (Nextcloud 21-22), or 3.8.7 (Nextcloud 15-20). There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-08T19:15:47.344Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64xc-r58v-53gj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64xc-r58v-53gj" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2669", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/2669" }, { "name": "https://hackerone.com/reports/1788222", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1788222" } ], "source": { "advisory": "GHSA-64xc-r58v-53gj", "discovery": "UNKNOWN" }, "title": "Document content of files can be obtained through Collabora for files of other users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25150", "datePublished": "2023-02-08T19:15:47.344Z", "dateReserved": "2023-02-03T16:59:18.242Z", "dateUpdated": "2024-08-02T11:18:35.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52518
Vulnerability from cvelistv5
Published
2024-11-15 16:46
Modified
2024-11-15 17:31
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/48373 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/48788 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/48992 | x_refsource_MISC | |
https://hackerone.com/reports/2602973 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.12 Version: >= 29.0.0, < 29.0.9 Version: >= 30.0.0, < 30.0.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52518", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:31:20.910406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:31:41.474Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.12" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.9" }, { "status": "affected", "version": "\u003e= 30.0.0, \u003c 30.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:46:44.675Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg" }, { "name": "https://github.com/nextcloud/server/pull/48373", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/48373" }, { "name": "https://github.com/nextcloud/server/pull/48788", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/48788" }, { "name": "https://github.com/nextcloud/server/pull/48992", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/48992" }, { "name": "https://hackerone.com/reports/2602973", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2602973" } ], "source": { "advisory": "GHSA-vrhf-532w-99rg", "discovery": "UNKNOWN" }, "title": "Nextcloud Server is missing password confirmation when changing external storage options" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52518", "datePublished": "2024-11-15T16:46:44.675Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T17:31:41.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32705
Vulnerability from cvelistv5
Published
2021-07-12 15:30
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public DAV endpoint. This may have allowed an attacker to enumerate potentially valid share tokens or credentials. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/27610 | x_refsource_MISC | |
https://hackerone.com/reports/1192159 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/27610" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1192159" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public DAV endpoint. This may have allowed an attacker to enumerate potentially valid share tokens or credentials. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799: Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:09:24", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/27610" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1192159" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-fjv7-283f-5m54", "discovery": "UNKNOWN" }, "title": "Lack of ratelimit on public DAV endpoint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32705", "STATE": "PUBLIC", "TITLE": "Lack of ratelimit on public DAV endpoint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public DAV endpoint. This may have allowed an attacker to enumerate potentially valid share tokens or credentials. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-799: Improper Control of Interaction Frequency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54" }, { "name": "https://github.com/nextcloud/server/pull/27610", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/27610" }, { "name": "https://hackerone.com/reports/1192159", "refsource": "MISC", "url": "https://hackerone.com/reports/1192159" }, { "name": "FEDORA-2021-9b421b78af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-fjv7-283f-5m54", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32705", "datePublished": "2021-07-12T15:30:14", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31118
Vulnerability from cvelistv5
Published
2022-08-04 16:50
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 22.2.9 Version: >= 23.0.0, < 23.0.6 Version: >= 24.0.0, < 24.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 22.2.9" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.6" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T16:50:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018" } ], "source": { "advisory": "GHSA-2vwh-5v93-3vcq", "discovery": "UNKNOWN" }, "title": "Missing brute force protection on cloud federation sharing in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31118", "STATE": "PUBLIC", "TITLE": "Missing brute force protection on cloud federation sharing in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 22.2.9" }, { "version_value": "\u003e= 23.0.0, \u003c 23.0.6" }, { "version_value": "\u003e= 24.0.0, \u003c 24.0.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770: Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq" }, { "name": "https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018" } ] }, "source": { "advisory": "GHSA-2vwh-5v93-3vcq", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31118", "datePublished": "2022-08-04T16:50:10", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28844
Vulnerability from cvelistv5
Published
2023-03-31 22:10
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud implementation. In affected versions users that should not be able to download a file can still download an older version and use that for uncontrolled distribution. This issue has been addressed in versions 24.0.10 and 25.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w47p-f66h-h2vj | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/36113 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.4 Version: < 24.0.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w47p-f66h-h2vj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w47p-f66h-h2vj" }, { "name": "https://github.com/nextcloud/server/pull/36113", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.4" }, { "status": "affected", "version": "\u003c 24.0.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud implementation. In affected versions users that should not be able to download a file can still download an older version and use that for uncontrolled distribution. This issue has been addressed in versions 24.0.10 and 25.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T22:10:29.311Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w47p-f66h-h2vj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w47p-f66h-h2vj" }, { "name": "https://github.com/nextcloud/server/pull/36113", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36113" } ], "source": { "advisory": "GHSA-w47p-f66h-h2vj", "discovery": "UNKNOWN" }, "title": "User without download rights can download older version of that file in nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28844", "datePublished": "2023-03-31T22:10:29.311Z", "dateReserved": "2023-03-24T16:25:34.466Z", "dateUpdated": "2024-08-02T13:51:38.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39958
Vulnerability from cvelistv5
Published
2023-08-10 17:04
Modified
2024-10-10 15:52
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38773 | x_refsource_MISC | |
https://hackerone.com/reports/1258448 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 22.0.0, < 22.2.10.13 Version: >= 23.0.0, < 23.0.12.8 Version: >= 24.0.0, < 24.0.12.5 Version: >= 25.0.0, < 25.0.9 Version: >= 26.0.0, < 26.0.4 Version: >= 27.0.0, < 27.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h" }, { "name": "https://github.com/nextcloud/server/pull/38773", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38773" }, { "name": "https://hackerone.com/reports/1258448", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1258448" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39958", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T15:51:49.254075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T15:52:01.095Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.13" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.8" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.5" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.9" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.4" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:10:58.079Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vv27-g2hq-v48h" }, { "name": "https://github.com/nextcloud/server/pull/38773", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38773" }, { "name": "https://hackerone.com/reports/1258448", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1258448" } ], "source": { "advisory": "GHSA-vv27-g2hq-v48h", "discovery": "UNKNOWN" }, "title": "Missing brute force protection on password reset token OAuth2 API controller" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39958", "datePublished": "2023-08-10T17:04:51.729Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-10T15:52:01.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41882
Vulnerability from cvelistv5
Published
2022-11-11 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. In version 3.6.0, if a user received a malicious file share and has it synced locally or the virtual filesystem enabled and clicked a nc://open/ link it will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. "vbs", is being executed. It is recommended that the Nextcloud Desktop client is upgraded to version 3.6.1. As a workaround, users can block the Nextcloud Desktop client 3.6.0 by setting the `minimum.supported.desktop.version` system config to `3.6.1` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used. Another workaround would be to enforce shares to be accepted by setting the `sharing.force_share_accept` system config to `true` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: = 3.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3w86-rm38-8w63" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5039" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34559" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/releases/tag/v3.6.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "= 3.6.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. In version 3.6.0, if a user received a malicious file share and has it synced locally or the virtual filesystem enabled and clicked a nc://open/ link it will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. \"vbs\", is being executed. It is recommended that the Nextcloud Desktop client is upgraded to version 3.6.1. As a workaround, users can block the Nextcloud Desktop client 3.6.0 by setting the `minimum.supported.desktop.version` system config to `3.6.1` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used. Another workaround would be to enforce shares to be accepted by setting the `sharing.force_share_accept` system config to `true` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-11T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3w86-rm38-8w63" }, { "url": "https://github.com/nextcloud/desktop/pull/5039" }, { "url": "https://github.com/nextcloud/server/pull/34559" }, { "url": "https://github.com/nextcloud/desktop/releases/tag/v3.6.1" } ], "source": { "advisory": "GHSA-3w86-rm38-8w63", "discovery": "UNKNOWN" }, "title": "Nextcloud Desktop vulnerable to code injection via malicious link" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41882", "datePublished": "2022-11-11T00:00:00", "dateReserved": "2022-09-30T00:00:00", "dateUpdated": "2024-08-03T12:56:38.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22470
Vulnerability from cvelistv5
Published
2023-01-14 00:32
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. A database error can be generated potentially causing a DoS when performed multiple times. There are currently no known workarounds. It is recommended that the Nextcloud Server is upgraded to 1.6.5 or 1.7.3 or 1.8.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-93j5-wx4c-6g88 | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/4059 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.6.0, < 1.6.5 Version: >= 1.7.0, < 1.7.3 Version: >= 1.8.0, < 1.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-93j5-wx4c-6g88", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-93j5-wx4c-6g88" }, { "name": "https://github.com/nextcloud/deck/pull/4059", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/4059" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.6.0, \u003c 1.6.5" }, { "status": "affected", "version": "\u003e= 1.7.0, \u003c 1.7.3" }, { "status": "affected", "version": "\u003e= 1.8.0, \u003c 1.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. A database error can be generated potentially causing a DoS when performed multiple times. There are currently no known workarounds. It is recommended that the Nextcloud Server is upgraded to 1.6.5 or 1.7.3 or 1.8.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-14T00:32:28.697Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-93j5-wx4c-6g88", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-93j5-wx4c-6g88" }, { "name": "https://github.com/nextcloud/deck/pull/4059", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/4059" } ], "source": { "advisory": "GHSA-93j5-wx4c-6g88", "discovery": "UNKNOWN" }, "title": "Nextcloud Deck vulnerable to uncontrolled resource consumption " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22470", "datePublished": "2023-01-14T00:32:28.697Z", "dateReserved": "2022-12-29T03:00:40.880Z", "dateUpdated": "2024-08-02T10:13:48.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32734
Vulnerability from cvelistv5
Published
2021-07-12 21:45
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, the Nextcloud Text application shipped with Nextcloud Server returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, one may disable the Nextcloud Text application in Nextcloud Server app settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526 | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/1695 | x_refsource_MISC | |
https://hackerone.com/reports/1246721 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/1695" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1246721" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, the Nextcloud Text application shipped with Nextcloud Server returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, one may disable the Nextcloud Text application in Nextcloud Server app settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209: Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:06:49", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/1695" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1246721" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-6hf5-c2c4-2526", "discovery": "UNKNOWN" }, "title": "File path disclosure of shared files in Nextcloud Text application", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32734", "STATE": "PUBLIC", "TITLE": "File path disclosure of shared files in Nextcloud Text application" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, the Nextcloud Text application shipped with Nextcloud Server returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, one may disable the Nextcloud Text application in Nextcloud Server app settings." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-209: Generation of Error Message Containing Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526" }, { "name": "https://github.com/nextcloud/text/pull/1695", "refsource": "MISC", "url": "https://github.com/nextcloud/text/pull/1695" }, { "name": "https://hackerone.com/reports/1246721", "refsource": "MISC", "url": "https://hackerone.com/reports/1246721" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-6hf5-c2c4-2526", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32734", "datePublished": "2021-07-12T21:45:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25160
Vulnerability from cvelistv5
Published
2023-02-13 20:19
Modified
2024-08-02 11:18
Severity ?
EPSS score ?
Summary
Nextcloud Mail is an email app for the Nextcloud home server platform. Prior to versions 2.2.1, 1.14.5, 1.12.9, and 1.11.8, an attacker can access the mail box by ID getting the subjects and the first characters of the emails. Users should upgrade to Mail 2.2.1 for Nextcloud 25, Mail 1.14.5 for Nextcloud 22-24, Mail 1.12.9 for Nextcloud 21, or Mail 1.11.8 for Nextcloud 20 to receive a patch. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/7740 | x_refsource_MISC | |
https://hackerone.com/reports/1784681 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.11.8 Version: >= 1.12.0, < 1.12.9 Version: >= 1.13.0, < 1.14.5 Version: >= 2.0.0, < 2.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:36.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx" }, { "name": "https://github.com/nextcloud/mail/pull/7740", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/7740" }, { "name": "https://hackerone.com/reports/1784681", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1784681" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.11.8" }, { "status": "affected", "version": "\u003e= 1.12.0, \u003c 1.12.9" }, { "status": "affected", "version": "\u003e= 1.13.0, \u003c 1.14.5" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is an email app for the Nextcloud home server platform. Prior to versions 2.2.1, 1.14.5, 1.12.9, and 1.11.8, an attacker can access the mail box by ID getting the subjects and the first characters of the emails. Users should upgrade to Mail 2.2.1 for Nextcloud 25, Mail 1.14.5 for Nextcloud 22-24, Mail 1.12.9 for Nextcloud 21, or Mail 1.11.8 for Nextcloud 20 to receive a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T20:19:08.774Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx" }, { "name": "https://github.com/nextcloud/mail/pull/7740", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/7740" }, { "name": "https://hackerone.com/reports/1784681", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1784681" } ], "source": { "advisory": "GHSA-m45f-r5gh-h6cx", "discovery": "UNKNOWN" }, "title": "IDOR Vulnerability in Nextcloud Mail" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25160", "datePublished": "2023-02-13T20:19:08.774Z", "dateReserved": "2023-02-03T16:59:18.245Z", "dateUpdated": "2024-08-02T11:18:36.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41180
Vulnerability from cvelistv5
Published
2022-03-08 17:45
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92 | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/6239 | x_refsource_MISC | |
https://hackerone.com/reports/1337178 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 12.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/6239" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1337178" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 12.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T17:45:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/6239" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1337178" } ], "source": { "advisory": "GHSA-4fxr-mrw2-cq92", "discovery": "UNKNOWN" }, "title": "Geolocation preview links can be set to arbitrary links in nextcloud talk", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41180", "STATE": "PUBLIC", "TITLE": "Geolocation preview links can be set to arbitrary links in nextcloud talk" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 12.1.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92" }, { "name": "https://github.com/nextcloud/spreed/pull/6239", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/6239" }, { "name": "https://hackerone.com/reports/1337178", "refsource": "MISC", "url": "https://hackerone.com/reports/1337178" } ] }, "source": { "advisory": "GHSA-4fxr-mrw2-cq92", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41180", "datePublished": "2022-03-08T17:45:12", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28643
Vulnerability from cvelistv5
Published
2023-03-30 18:31
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud implementation. In affected versions when a recipient receives 2 shares with the same name, while a memory cache is configured, the second share will replace the first one instead of being renamed to `{name} (2)`. It is recommended that the Nextcloud Server is upgraded to 25.0.3 or 24.0.9. Users unable to upgrade should avoid sharing 2 folders with the same name to the same user.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/issues/34015 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/36047 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 24.0.9 Version: >= 25.0.0, < 25.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27" }, { "name": "https://github.com/nextcloud/server/issues/34015", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/issues/34015" }, { "name": "https://github.com/nextcloud/server/pull/36047", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36047" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 24.0.9" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud implementation. In affected versions when a recipient receives 2 shares with the same name, while a memory cache is configured, the second share will replace the first one instead of being renamed to `{name} (2)`. It is recommended that the Nextcloud Server is upgraded to 25.0.3 or 24.0.9. Users unable to upgrade should avoid sharing 2 folders with the same name to the same user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-706", "description": "CWE-706: Use of Incorrectly-Resolved Name or Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:31:31.609Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27" }, { "name": "https://github.com/nextcloud/server/issues/34015", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/issues/34015" }, { "name": "https://github.com/nextcloud/server/pull/36047", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36047" } ], "source": { "advisory": "GHSA-hhq4-4pr8-wm27", "discovery": "UNKNOWN" }, "title": "Potential share collision for recipients when caching is enabled in nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28643", "datePublished": "2023-03-30T18:31:31.609Z", "dateReserved": "2023-03-20T12:19:47.209Z", "dateUpdated": "2024-08-02T13:43:23.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37630
Vulnerability from cvelistv5
Published
2021-09-07 20:00
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application allowed any user to join any "Secret Circle" without approval by the Circle owner leaking private information. It is recommended that Nextcloud Circles is upgraded to 0.19.15, 0.20.11 or 0.21.4. There are no workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56j9-3rj4-wvgm | x_refsource_CONFIRM | |
https://github.com/nextcloud/circles/pull/768 | x_refsource_MISC | |
https://hackerone.com/reports/1257624 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 0.19.15 Version: >= 0.20.0, < 0.20.11 Version: >= 0.21.0, < 0.21.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56j9-3rj4-wvgm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/circles/pull/768" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1257624" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 0.19.15" }, { "status": "affected", "version": "\u003e= 0.20.0, \u003c 0.20.11" }, { "status": "affected", "version": "\u003e= 0.21.0, \u003c 0.21.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application allowed any user to join any \"Secret Circle\" without approval by the Circle owner leaking private information. It is recommended that Nextcloud Circles is upgraded to 0.19.15, 0.20.11 or 0.21.4. There are no workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-07T20:00:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56j9-3rj4-wvgm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/circles/pull/768" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1257624" } ], "source": { "advisory": "GHSA-56j9-3rj4-wvgm", "discovery": "UNKNOWN" }, "title": "Secret Circle can be joined without approval in Nextcloud Circles", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37630", "STATE": "PUBLIC", "TITLE": "Secret Circle can be joined without approval in Nextcloud Circles" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 0.19.15" }, { "version_value": "\u003e= 0.20.0, \u003c 0.20.11" }, { "version_value": "\u003e= 0.21.0, \u003c 0.21.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application allowed any user to join any \"Secret Circle\" without approval by the Circle owner leaking private information. It is recommended that Nextcloud Circles is upgraded to 0.19.15, 0.20.11 or 0.21.4. There are no workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639: Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56j9-3rj4-wvgm", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56j9-3rj4-wvgm" }, { "name": "https://github.com/nextcloud/circles/pull/768", "refsource": "MISC", "url": "https://github.com/nextcloud/circles/pull/768" }, { "name": "https://hackerone.com/reports/1257624", "refsource": "MISC", "url": "https://hackerone.com/reports/1257624" } ] }, "source": { "advisory": "GHSA-56j9-3rj4-wvgm", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37630", "datePublished": "2021-09-07T20:00:12", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25159
Vulnerability from cvelistv5
Published
2023-02-13 16:43
Modified
2024-08-02 11:18
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Office is a document collaboration app for the same platform. Nextcloud Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, Nextcloud Enterprise Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, and Nextcloud Office (Richdocuments) App 6.x prior to 6.3.1 and 7.x prior to 7.0.1 have previews accessible without a watermark. The download should be hidden and the watermark should get applied. This issue is fixed in Nextcloud Server 25.0.1 and 24.0.8, Nextcloud Enterprise Server 25.0.1 and 24.0.8, and Nextcloud Office (Richdocuments) App 7.0.1 (for 25) and 6.3.1 (for 24). No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/2579 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/34799 | x_refsource_MISC | |
https://hackerone.com/reports/1745755 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.4, < 24.0.8 Version: = 25.0.0 Version: >= 6.0.0, < 6.3.1 Version: = 7.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2579", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/2579" }, { "name": "https://github.com/nextcloud/server/pull/34799", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34799" }, { "name": "https://hackerone.com/reports/1745755", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1745755" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.4, \u003c 24.0.8" }, { "status": "affected", "version": "= 25.0.0" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.3.1" }, { "status": "affected", "version": "= 7.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Office is a document collaboration app for the same platform. Nextcloud Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, Nextcloud Enterprise Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, and Nextcloud Office (Richdocuments) App 6.x prior to 6.3.1 and 7.x prior to 7.0.1 have previews accessible without a watermark. The download should be hidden and the watermark should get applied. This issue is fixed in Nextcloud Server 25.0.1 and 24.0.8, Nextcloud Enterprise Server 25.0.1 and 24.0.8, and Nextcloud Office (Richdocuments) App 7.0.1 (for 25) and 6.3.1 (for 24). No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T16:43:12.227Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2579", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/2579" }, { "name": "https://github.com/nextcloud/server/pull/34799", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/34799" }, { "name": "https://hackerone.com/reports/1745755", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1745755" } ], "source": { "advisory": "GHSA-92g2-h5jv-jjmg", "discovery": "UNKNOWN" }, "title": "Nextcloud Server previews are accessible without a watermark" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25159", "datePublished": "2023-02-13T16:43:12.227Z", "dateReserved": "2023-02-03T16:59:18.244Z", "dateUpdated": "2024-08-02T11:18:35.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-30539
Vulnerability from cvelistv5
Published
2023-04-17 21:27
Modified
2024-08-02 14:28
Severity ?
EPSS score ?
Summary
Nextcloud is a personal home server system. Depending on the set up tags and other workflows this issue can be used to limit access of others or being able to grant them access when there are system tag based files access control or files retention rules. It is recommended that the Nextcloud Server is upgraded to 24.0.11 or 25.0.5, the Nextcloud Enterprise Server to 21.0.9.11, 22.2.10.11, 23.0.12.6, 24.0.11 or 25.0.5, and the Nextcloud Files automated tagging app to 1.11.1, 1.12.1, 1.13.1, 1.14.2, 1.15.3 or 1.16.1. Users unable to upgrade should disable all workflow related apps. Users are advised to upgrade.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99 | x_refsource_CONFIRM | |
https://github.com/nextcloud/files_automatedtagging/pull/705 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/37252 | x_refsource_MISC | |
https://hackerone.com/reports/1895976 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: Nextcloud Server: < 24.0.11 Version: Nextcloud Server: >= 25.0.0, < 25.0.5 Version: Nextcloud Files automated tagging: >= 1.11.0, < 1.11.1 Version: Nextcloud Files automated tagging: >= 1.12.0, < 1.12.1 Version: Nextcloud Files automated tagging: >= 1.13.0, < 1.13.1 Version: Nextcloud Files automated tagging: >= 1.14.0, < 1.14.2 Version: Nextcloud Files automated tagging: >= 1.15.0, < 1.15.3 Version: Nextcloud Files automated tagging: >= 1.16.0, < 1.16.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:28:51.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99" }, { "name": "https://github.com/nextcloud/files_automatedtagging/pull/705", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/files_automatedtagging/pull/705" }, { "name": "https://github.com/nextcloud/server/pull/37252", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/37252" }, { "name": "https://hackerone.com/reports/1895976", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1895976" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "Nextcloud Server: \u003c 24.0.11" }, { "status": "affected", "version": "Nextcloud Server: \u003e= 25.0.0, \u003c 25.0.5" }, { "status": "affected", "version": "Nextcloud Files automated tagging: \u003e= 1.11.0, \u003c 1.11.1" }, { "status": "affected", "version": "Nextcloud Files automated tagging: \u003e= 1.12.0, \u003c 1.12.1" }, { "status": "affected", "version": "Nextcloud Files automated tagging: \u003e= 1.13.0, \u003c 1.13.1" }, { "status": "affected", "version": "Nextcloud Files automated tagging: \u003e= 1.14.0, \u003c 1.14.2" }, { "status": "affected", "version": "Nextcloud Files automated tagging: \u003e= 1.15.0, \u003c 1.15.3" }, { "status": "affected", "version": "Nextcloud Files automated tagging: \u003e= 1.16.0, \u003c 1.16.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is a personal home server system. Depending on the set up tags and other workflows this issue can be used to limit access of others or being able to grant them access when there are system tag based files access control or files retention rules. It is recommended that the Nextcloud Server is upgraded to 24.0.11 or 25.0.5, the Nextcloud Enterprise Server to 21.0.9.11, 22.2.10.11, 23.0.12.6, 24.0.11 or 25.0.5, and the Nextcloud Files automated tagging app to 1.11.1, 1.12.1, 1.13.1, 1.14.2, 1.15.3 or 1.16.1. Users unable to upgrade should disable all workflow related apps. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-17T21:27:29.405Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99" }, { "name": "https://github.com/nextcloud/files_automatedtagging/pull/705", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/files_automatedtagging/pull/705" }, { "name": "https://github.com/nextcloud/server/pull/37252", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/37252" }, { "name": "https://hackerone.com/reports/1895976", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1895976" } ], "source": { "advisory": "GHSA-3m2f-v8x7-9w99", "discovery": "UNKNOWN" }, "title": "Users can set up workflows using restricted and invisible system tags in Nextcloud" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-30539", "datePublished": "2023-04-17T21:27:29.405Z", "dateReserved": "2023-04-12T15:19:33.766Z", "dateUpdated": "2024-08-02T14:28:51.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28998
Vulnerability from cvelistv5
Published
2023-04-04 12:45
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.0, < 3.6.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr" }, { "name": "https://github.com/nextcloud/desktop/pull/5323", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5323" }, { "name": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files.\u200b Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-325", "description": "CWE-325: Missing Cryptographic Step", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-04T12:45:42.156Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr" }, { "name": "https://github.com/nextcloud/desktop/pull/5323", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/5323" }, { "name": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf", "tags": [ "x_refsource_MISC" ], "url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf" } ], "source": { "advisory": "GHSA-jh3g-wpwv-cqgr", "discovery": "UNKNOWN" }, "title": "Nextcloud Desktop client misbehaves with E2EE when the server returns empty list of metadata keys" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28998", "datePublished": "2023-04-04T12:45:42.156Z", "dateReserved": "2023-03-29T17:39:16.141Z", "dateUpdated": "2024-08-02T13:51:38.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35172
Vulnerability from cvelistv5
Published
2023-06-23 20:49
Modified
2024-12-05 16:16
Severity ?
EPSS score ?
Summary
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, an attacker can bruteforce the password reset links. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38267 | x_refsource_MISC | |
https://hackerone.com/reports/1987062 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: Nextcloud Server >= 25.0.0, < 25.0.7 Version: Nextcloud Server >= 26.0.0, < 26.0.2 Version: Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 Version: Nextcloud Enterprise Server >= 26.0.0, < 26.0.2 Version: Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12 Version: Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12 Version: Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7 Version: Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:23:59.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6" }, { "name": "https://github.com/nextcloud/server/pull/38267", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38267" }, { "name": "https://hackerone.com/reports/1987062", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1987062" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35172", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T16:15:31.114676Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T16:16:35.458Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "Nextcloud Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Server \u003e= 26.0.0, \u003c 26.0.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 26.0.0, \u003c 26.0.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 21.0.0, \u003c 21.0.9.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 22.0.0, \u003c 22.2.10.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 23.0.0, \u003c 23.0.12.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 24.0.0, \u003c 24.0.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, an attacker can bruteforce the password reset links. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T20:49:56.795Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mjf5-p765-qmr6" }, { "name": "https://github.com/nextcloud/server/pull/38267", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38267" }, { "name": "https://hackerone.com/reports/1987062", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1987062" } ], "source": { "advisory": "GHSA-mjf5-p765-qmr6", "discovery": "UNKNOWN" }, "title": "Nextcloud Server password reset endpoint is not brute force protected" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35172", "datePublished": "2023-06-23T20:49:56.795Z", "dateReserved": "2023-06-14T14:17:52.180Z", "dateUpdated": "2024-12-05T16:16:35.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37316
Vulnerability from cvelistv5
Published
2024-06-14 15:23
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
Nextcloud Calendar is a calendar app for Nextcloud. Authenticated users could create an event with manipulated attachment data leading to a bad redirect for participants when clicked. It is recommended that the Nextcloud Calendar App is upgraded to 4.6.8 or 4.7.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2r7q-vfmv-79qf | x_refsource_CONFIRM | |
https://github.com/nextcloud/calendar/pull/5966 | x_refsource_MISC | |
https://hackerone.com/reports/2457588 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 4.3.0, < 4.6.8 Version: >= 4.7.0, < 4.7.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37316", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-12T19:03:58.800051Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-12T19:04:06.344Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:56.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2r7q-vfmv-79qf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2r7q-vfmv-79qf" }, { "name": "https://github.com/nextcloud/calendar/pull/5966", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/calendar/pull/5966" }, { "name": "https://hackerone.com/reports/2457588", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2457588" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 4.3.0, \u003c 4.6.8" }, { "status": "affected", "version": "\u003e= 4.7.0, \u003c 4.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Calendar is a calendar app for Nextcloud. Authenticated users could create an event with manipulated attachment data leading to a bad redirect for participants when clicked. It is recommended that the Nextcloud Calendar App is upgraded to 4.6.8 or 4.7.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-241", "description": "CWE-241: Improper Handling of Unexpected Data Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:23:12.705Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2r7q-vfmv-79qf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2r7q-vfmv-79qf" }, { "name": "https://github.com/nextcloud/calendar/pull/5966", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/calendar/pull/5966" }, { "name": "https://hackerone.com/reports/2457588", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2457588" } ], "source": { "advisory": "GHSA-2r7q-vfmv-79qf", "discovery": "UNKNOWN" }, "title": "Nextcloud Calendar\u0027s event create can create attachments that link to other websites" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37316", "datePublished": "2024-06-14T15:23:12.705Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:56.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39211
Vulnerability from cvelistv5
Published
2022-09-16 23:10
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/32988 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/33031 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.8 Version: >= 24.0.0, < 24.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/32988" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/33031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.8" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T23:10:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/32988" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/33031" } ], "source": { "advisory": "GHSA-rmf9-w497-8cq8", "discovery": "UNKNOWN" }, "title": "Server-Side Request Forgery (SSRF) via potential filter bypass in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-39211", "STATE": "PUBLIC", "TITLE": "Server-Side Request Forgery (SSRF) via potential filter bypass in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 23.0.8" }, { "version_value": "\u003e= 24.0.0, \u003c 24.0.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8" }, { "name": "https://github.com/nextcloud/server/pull/32988", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/32988" }, { "name": "https://github.com/nextcloud/server/pull/33031", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/33031" } ] }, "source": { "advisory": "GHSA-rmf9-w497-8cq8", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39211", "datePublished": "2022-09-16T23:10:10", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24888
Vulnerability from cvelistv5
Published
2022-04-27 14:25
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/29895 | x_refsource_MISC | |
https://hackerone.com/reports/1402249 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.14.4 Version: < 21.0.8 Version: < 22.2.4 Version: < 23.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/29895" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1402249" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": " \u003c 20.0.14.4" }, { "status": "affected", "version": "\u003c 21.0.8" }, { "status": "affected", "version": "\u003c 22.2.4" }, { "status": "affected", "version": "\u003c 23.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \\n, \\r, \\t, and \\v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:10:48", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/29895" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1402249" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-w3h6-p64h-q9jp", "discovery": "UNKNOWN" }, "title": "Possible Injection in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24888", "STATE": "PUBLIC", "TITLE": "Possible Injection in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": " \u003c 20.0.14.4" }, { "version_value": "\u003c 21.0.8" }, { "version_value": "\u003c 22.2.4" }, { "version_value": "\u003c 23.0.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \\n, \\r, \\t, and \\v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp" }, { "name": "https://github.com/nextcloud/server/pull/29895", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/29895" }, { "name": "https://hackerone.com/reports/1402249", "refsource": "MISC", "url": "https://hackerone.com/reports/1402249" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-w3h6-p64h-q9jp", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24888", "datePublished": "2022-04-27T14:25:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39333
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/4972" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92p9-x79h-2mj8" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1711847" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/desktop/pull/4972" }, { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92p9-x79h-2mj8" }, { "url": "https://hackerone.com/reports/1711847" } ], "source": { "advisory": "GHSA-92p9-x79h-2mj8", "discovery": "UNKNOWN" }, "title": "Cross-site scripting (XSS) in Nextcloud Desktop Client" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39333", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31132
Vulnerability from cvelistv5
Published
2022-08-04 17:10
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions shipped with a CSS minifier on the path `./vendor/cerdic/css-tidy/css_optimiser.php`. Access to the minifier is unrestricted and access may lead to Server-Side Request Forgery (SSRF). It is recommendet to upgrade to Mail 1.12.7 or Mail 1.13.6. Users unable to upgrade may manually delete the file located at `./vendor/cerdic/css-tidy/css_optimiser.php`
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24pm-rjfv-23mh | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.12.8 Version: >= 1.13.0, < 1.13.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24pm-rjfv-23mh" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.12.8" }, { "status": "affected", "version": "\u003e= 1.13.0, \u003c 1.13.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions shipped with a CSS minifier on the path `./vendor/cerdic/css-tidy/css_optimiser.php`. Access to the minifier is unrestricted and access may lead to Server-Side Request Forgery (SSRF). It is recommendet to upgrade to Mail 1.12.7 or Mail 1.13.6. Users unable to upgrade may manually delete the file located at `./vendor/cerdic/css-tidy/css_optimiser.php`" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T17:10:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24pm-rjfv-23mh" } ], "source": { "advisory": "GHSA-24pm-rjfv-23mh", "discovery": "UNKNOWN" }, "title": "Unauthenticated SSRF in 3rd party module \"cerdic/csstidy\"", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31132", "STATE": "PUBLIC", "TITLE": "Unauthenticated SSRF in 3rd party module \"cerdic/csstidy\"" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.12.8" }, { "version_value": "\u003e= 1.13.0, \u003c 1.13.6" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions shipped with a CSS minifier on the path `./vendor/cerdic/css-tidy/css_optimiser.php`. Access to the minifier is unrestricted and access may lead to Server-Side Request Forgery (SSRF). It is recommendet to upgrade to Mail 1.12.7 or Mail 1.13.6. Users unable to upgrade may manually delete the file located at `./vendor/cerdic/css-tidy/css_optimiser.php`" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24pm-rjfv-23mh", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24pm-rjfv-23mh" } ] }, "source": { "advisory": "GHSA-24pm-rjfv-23mh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31132", "datePublished": "2022-08-04T17:10:10", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23942
Vulnerability from cvelistv5
Published
2023-02-06 20:23
Modified
2024-08-02 10:49
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from a Nextcloud Server with your computer. Versions prior to 3.6.3 are missing sanitisation on qml labels which are used for basic HTML elements such as `strong`, `em` and `head` lines in the UI of the desktop client. The lack of sanitisation may allow for javascript injection. It is recommended that the Nextcloud Desktop Client is upgraded to 3.6.3. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/5233 | x_refsource_MISC | |
https://hackerone.com/reports/1788598 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.6.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:49:08.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg" }, { "name": "https://github.com/nextcloud/desktop/pull/5233", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5233" }, { "name": "https://hackerone.com/reports/1788598", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1788598" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.6.3" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from a Nextcloud Server with your computer. Versions prior to 3.6.3 are missing sanitisation on qml labels which are used for basic HTML elements such as `strong`, `em` and `head` lines in the UI of the desktop client. The lack of sanitisation may allow for javascript injection. It is recommended that the Nextcloud Desktop Client is upgraded to 3.6.3. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-06T20:23:06.072Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg" }, { "name": "https://github.com/nextcloud/desktop/pull/5233", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/5233" }, { "name": "https://hackerone.com/reports/1788598", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1788598" } ], "source": { "advisory": "GHSA-64qc-vf6v-8xgg", "discovery": "UNKNOWN" }, "title": "Self reflected HTML injection in Desktop client" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23942", "datePublished": "2023-02-06T20:23:06.072Z", "dateReserved": "2023-01-19T21:12:31.362Z", "dateUpdated": "2024-08-02T10:49:08.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32319
Vulnerability from cvelistv5
Published
2023-05-26 22:49
Modified
2024-08-02 15:10
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud implementation. Missing brute-force protection on the WebDAV endpoints via the basic auth header allowed to brute-force user credentials when the provided user name was not an email address. Users from version 24.0.0 onward are affected. This issue has been addressed in releases 24.0.11, 25.0.5 and 26.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/37227 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.0, < 24.0.11 Version: >= 25.0.0, < 25.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54" }, { "name": "https://github.com/nextcloud/server/pull/37227", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/37227" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.11" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud implementation. Missing brute-force protection on the WebDAV endpoints via the basic auth header allowed to brute-force user credentials when the provided user name was not an email address. Users from version 24.0.0 onward are affected. This issue has been addressed in releases 24.0.11, 25.0.5 and 26.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T22:49:30.234Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54" }, { "name": "https://github.com/nextcloud/server/pull/37227", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/37227" } ], "source": { "advisory": "GHSA-mr7q-xf62-fw54", "discovery": "UNKNOWN" }, "title": "Basic auth header on WebDAV requests is not brute-force protected in Nextcloud" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32319", "datePublished": "2023-05-26T22:49:30.234Z", "dateReserved": "2023-05-08T13:26:03.879Z", "dateUpdated": "2024-08-02T15:10:24.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31024
Vulnerability from cvelistv5
Published
2022-06-02 18:25
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
richdocuments is the repository for NextCloud Collabra, the app for Nextcloud Office collaboration. Prior to versions 6.0.0, 5.0.4, and 4.2.6, a user could be tricked into working against a remote Office by sending them a federated share. richdocuments versions 6.0.0, 5.0.4 and 4.2.6 contain a fix for this issue. There are currently no known workarounds available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-94hr-7g4v-f53r | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/2161 | x_refsource_MISC | |
https://hackerone.com/reports/1210424 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 4.2.6 Version: >= 5.0.0, < 5.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-94hr-7g4v-f53r" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/2161" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1210424" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 4.2.6" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "richdocuments is the repository for NextCloud Collabra, the app for Nextcloud Office collaboration. Prior to versions 6.0.0, 5.0.4, and 4.2.6, a user could be tricked into working against a remote Office by sending them a federated share. richdocuments versions 6.0.0, 5.0.4 and 4.2.6 contain a fix for this issue. There are currently no known workarounds available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346: Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-02T18:25:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-94hr-7g4v-f53r" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/2161" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1210424" } ], "source": { "advisory": "GHSA-94hr-7g4v-f53r", "discovery": "UNKNOWN" }, "title": "Federated editing allows iframing remote servers by default in richdocuments", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31024", "STATE": "PUBLIC", "TITLE": "Federated editing allows iframing remote servers by default in richdocuments" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 4.2.6" }, { "version_value": "\u003e= 5.0.0, \u003c 5.0.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "richdocuments is the repository for NextCloud Collabra, the app for Nextcloud Office collaboration. Prior to versions 6.0.0, 5.0.4, and 4.2.6, a user could be tricked into working against a remote Office by sending them a federated share. richdocuments versions 6.0.0, 5.0.4 and 4.2.6 contain a fix for this issue. There are currently no known workarounds available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] }, { "description": [ { "lang": "eng", "value": "CWE-346: Origin Validation Error" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-94hr-7g4v-f53r", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-94hr-7g4v-f53r" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2161", "refsource": "MISC", "url": "https://github.com/nextcloud/richdocuments/pull/2161" }, { "name": "https://hackerone.com/reports/1210424", "refsource": "MISC", "url": "https://hackerone.com/reports/1210424" } ] }, "source": { "advisory": "GHSA-94hr-7g4v-f53r", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31024", "datePublished": "2022-06-02T18:25:11", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39961
Vulnerability from cvelistv5
Published
2023-08-10 17:18
Modified
2024-10-10 15:51
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/4481 | x_refsource_MISC | |
https://hackerone.com/reports/1965156 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.4, < 24.0.12.5 Version: >= 25.0.0, < 25.0.9 Version: >= 27.0.0, < 27.0.1 Version: >= 26.0.0, < 26.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp" }, { "name": "https://github.com/nextcloud/text/pull/4481", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/4481" }, { "name": "https://hackerone.com/reports/1965156", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1965156" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39961", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T15:51:09.615374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T15:51:18.932Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.4, \u003c 24.0.12.5" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.9" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:18:40.903Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp" }, { "name": "https://github.com/nextcloud/text/pull/4481", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/4481" }, { "name": "https://hackerone.com/reports/1965156", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1965156" } ], "source": { "advisory": "GHSA-qhgm-w4gx-gvgp", "discovery": "UNKNOWN" }, "title": "Text does not respect \"Allow download\" permissions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39961", "datePublished": "2023-08-10T17:18:40.903Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-10T15:51:18.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35932
Vulnerability from cvelistv5
Published
2022-08-12 15:20
Modified
2024-08-03 09:51
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.7, 13.0.7, and 14.0.3, password protected conversations are susceptible to brute force attacks if the attacker has the link/conversation token. It is recommended that the Nextcloud Talk application is upgraded to 12.2.7, 13.0.7 or 14.0.3. There are currently no known workarounds available apart from not having password protected conversations.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pf36-jvpv-4hwq | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/7504 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/pull/7535 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/pull/7536 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/pull/7537 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/commit/04300bbed0e87ff3420b5d752bbc48e2c15f35e9 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/commit/10341b9fe59a44ae0d139c072abd6b5026f33771 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/commit/f5ac73940f9f683b11e518d1c54150bf50dab9be | x_refsource_MISC | |
https://hackerone.com/reports/1596673 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 12.2.0, < 12.2.7 Version: >= 13.0.0, < 13.0.7 Version: >= 14.0.0, < 14.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:51:59.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pf36-jvpv-4hwq" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7504" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7535" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7536" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7537" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/commit/04300bbed0e87ff3420b5d752bbc48e2c15f35e9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/commit/10341b9fe59a44ae0d139c072abd6b5026f33771" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/commit/f5ac73940f9f683b11e518d1c54150bf50dab9be" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1596673" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 12.2.0, \u003c 12.2.7" }, { "status": "affected", "version": "\u003e= 13.0.0, \u003c 13.0.7" }, { "status": "affected", "version": "\u003e= 14.0.0, \u003c 14.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.7, 13.0.7, and 14.0.3, password protected conversations are susceptible to brute force attacks if the attacker has the link/conversation token. It is recommended that the Nextcloud Talk application is upgraded to 12.2.7, 13.0.7 or 14.0.3. There are currently no known workarounds available apart from not having password protected conversations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-12T15:20:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pf36-jvpv-4hwq" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7504" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7535" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7536" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7537" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/commit/04300bbed0e87ff3420b5d752bbc48e2c15f35e9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/commit/10341b9fe59a44ae0d139c072abd6b5026f33771" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/commit/f5ac73940f9f683b11e518d1c54150bf50dab9be" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1596673" } ], "source": { "advisory": "GHSA-pf36-jvpv-4hwq", "discovery": "UNKNOWN" }, "title": "Missing rate limit when trying to join a password protected Nextcloud Talk conversation", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-35932", "STATE": "PUBLIC", "TITLE": "Missing rate limit when trying to join a password protected Nextcloud Talk conversation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003e= 12.2.0, \u003c 12.2.7" }, { "version_value": "\u003e= 13.0.0, \u003c 13.0.7" }, { "version_value": "\u003e= 14.0.0, \u003c 14.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Talk is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.7, 13.0.7, and 14.0.3, password protected conversations are susceptible to brute force attacks if the attacker has the link/conversation token. It is recommended that the Nextcloud Talk application is upgraded to 12.2.7, 13.0.7 or 14.0.3. There are currently no known workarounds available apart from not having password protected conversations." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pf36-jvpv-4hwq", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pf36-jvpv-4hwq" }, { "name": "https://github.com/nextcloud/spreed/pull/7504", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7504" }, { "name": "https://github.com/nextcloud/spreed/pull/7535", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7535" }, { "name": "https://github.com/nextcloud/spreed/pull/7536", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7536" }, { "name": "https://github.com/nextcloud/spreed/pull/7537", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7537" }, { "name": "https://github.com/nextcloud/spreed/commit/04300bbed0e87ff3420b5d752bbc48e2c15f35e9", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/commit/04300bbed0e87ff3420b5d752bbc48e2c15f35e9" }, { "name": "https://github.com/nextcloud/spreed/commit/10341b9fe59a44ae0d139c072abd6b5026f33771", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/commit/10341b9fe59a44ae0d139c072abd6b5026f33771" }, { "name": "https://github.com/nextcloud/spreed/commit/f5ac73940f9f683b11e518d1c54150bf50dab9be", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/commit/f5ac73940f9f683b11e518d1c54150bf50dab9be" }, { "name": "https://hackerone.com/reports/1596673", "refsource": "MISC", "url": "https://hackerone.com/reports/1596673" } ] }, "source": { "advisory": "GHSA-pf36-jvpv-4hwq", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-35932", "datePublished": "2022-08-12T15:20:17", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:51:59.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24838
Vulnerability from cvelistv5
Published
2022-04-11 20:25
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:<BOOKING USER'S EMAIL> ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf | x_refsource_CONFIRM | |
https://github.com/nextcloud/calendar/pull/4073 | x_refsource_MISC | |
https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.2.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/calendar/pull/4073" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:\u003cBOOKING USER\u0027S EMAIL\u003e ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T20:25:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/calendar/pull/4073" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35" } ], "source": { "advisory": "GHSA-8xv5-4855-24qf", "discovery": "UNKNOWN" }, "title": "Command Injection in Appointment Emails for Nextcloud Calendar", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24838", "STATE": "PUBLIC", "TITLE": "Command Injection in Appointment Emails for Nextcloud Calendar" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.2.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:\u003cBOOKING USER\u0027S EMAIL\u003e ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8xv5-4855-24qf" }, { "name": "https://github.com/nextcloud/calendar/pull/4073", "refsource": "MISC", "url": "https://github.com/nextcloud/calendar/pull/4073" }, { "name": "https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35", "refsource": "MISC", "url": "https://github.com/nextcloud/calendar/commit/7b70edfb8a0fcf0926f613ababcbd56c6ecd9f35" } ] }, "source": { "advisory": "GHSA-8xv5-4855-24qf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24838", "datePublished": "2022-04-11T20:25:13", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41968
Vulnerability from cvelistv5
Published
2022-12-01 20:38
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.10 and 24.0.5, calendar name lengths are not validated before writing to a database. As a result, an attacker can send unnecessary amounts of data against the database. Version 23.0.10 and 24.0.5 contain patches for the issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/33139 | x_refsource_MISC | |
https://hackerone.com/reports/1596148 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.10 Version: >= 24.0.0, < 24.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:39.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v" }, { "name": "https://github.com/nextcloud/server/pull/33139", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/33139" }, { "name": "https://hackerone.com/reports/1596148", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1596148" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.10" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.10 and 24.0.5, calendar name lengths are not validated before writing to a database. As a result, an attacker can send unnecessary amounts of data against the database. Version 23.0.10 and 24.0.5 contain patches for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-01T20:38:46.973Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v" }, { "name": "https://github.com/nextcloud/server/pull/33139", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/33139" }, { "name": "https://hackerone.com/reports/1596148", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1596148" } ], "source": { "advisory": "GHSA-m92j-xxc8-hq3v", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s calendar name length not validated before writing to database" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41968", "datePublished": "2022-12-01T20:38:46.973Z", "dateReserved": "2022-09-30T16:38:28.956Z", "dateUpdated": "2024-08-03T12:56:39.130Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24886
Vulnerability from cvelistv5
Published
2022-04-27 13:30
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5cj3-v98r-2wmq | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/9726 | x_refsource_MISC | |
https://hackerone.com/reports/1161401 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.19.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5cj3-v98r-2wmq" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/9726" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1161401" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.19.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T13:30:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5cj3-v98r-2wmq" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/9726" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1161401" } ], "source": { "advisory": "GHSA-5cj3-v98r-2wmq", "discovery": "UNKNOWN" }, "title": "Exposure of Sensitive Information to an Unauthorized Actor in com.nextcloud.client", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24886", "STATE": "PUBLIC", "TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in com.nextcloud.client" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.19.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5cj3-v98r-2wmq", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5cj3-v98r-2wmq" }, { "name": "https://github.com/nextcloud/android/pull/9726", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/9726" }, { "name": "https://hackerone.com/reports/1161401", "refsource": "MISC", "url": "https://hackerone.com/reports/1161401" } ] }, "source": { "advisory": "GHSA-5cj3-v98r-2wmq", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24886", "datePublished": "2022-04-27T13:30:14", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52510
Vulnerability from cvelistv5
Published
2024-11-15 17:29
Modified
2024-11-15 18:20
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r4qc-m9mj-452v | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/7333 | x_refsource_MISC | |
https://github.com/nextcloud/desktop/commit/97539218e6f63c3a3fd1694cb7d8aef27c5910d7 | x_refsource_MISC | |
https://hackerone.com/reports/2597504 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.0, < 3.14.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:19:59.060560Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:20:10.869Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.14.2" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:29:44.840Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r4qc-m9mj-452v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r4qc-m9mj-452v" }, { "name": "https://github.com/nextcloud/desktop/pull/7333", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/7333" }, { "name": "https://github.com/nextcloud/desktop/commit/97539218e6f63c3a3fd1694cb7d8aef27c5910d7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/commit/97539218e6f63c3a3fd1694cb7d8aef27c5910d7" }, { "name": "https://hackerone.com/reports/2597504", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2597504" } ], "source": { "advisory": "GHSA-r4qc-m9mj-452v", "discovery": "UNKNOWN" }, "title": "Nextcloud Desktop client behaves incorrectly if the initial end-to-end-encryption signature is empty" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52510", "datePublished": "2024-11-15T17:29:44.840Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T18:20:10.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41181
Vulnerability from cvelistv5
Published
2022-03-08 17:50
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf | x_refsource_CONFIRM | |
https://github.com/nextcloud/talk-android/pull/1585 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 12.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/talk-android/pull/1585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 12.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T17:50:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/talk-android/pull/1585" } ], "source": { "advisory": "GHSA-497c-c8hx-6qcf", "discovery": "UNKNOWN" }, "title": "Nextcloud Talk app exposes chat messages on lockscreen", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41181", "STATE": "PUBLIC", "TITLE": "Nextcloud Talk app exposes chat messages on lockscreen" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 12.3.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf" }, { "name": "https://github.com/nextcloud/talk-android/pull/1585", "refsource": "MISC", "url": "https://github.com/nextcloud/talk-android/pull/1585" } ] }, "source": { "advisory": "GHSA-497c-c8hx-6qcf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41181", "datePublished": "2022-03-08T17:50:10", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39330
Vulnerability from cvelistv5
Published
2022-10-27 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server prior to versions 22.2.10, 23.0.10, and 24.0.6 are vulnerable to a logged-in attacker slowing down the system by generating a lot of database/cpu load. Nextcloud Server versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server versions 22.2.10, 23.0.10, and 24.0.6 contain patches for this issue. As a workaround, disable the Circles app.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 23.0.0, < 23.0.9 Version: >= 24.0.0, < 24.0.5 Version: < 22.2.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wxx7-w5p4-7x4c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/circles/pull/1147" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1688199" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.9" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.5" }, { "status": "affected", "version": "\u003c 22.2.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server prior to versions 22.2.10, 23.0.10, and 24.0.6 are vulnerable to a logged-in attacker slowing down the system by generating a lot of database/cpu load. Nextcloud Server versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server versions 22.2.10, 23.0.10, and 24.0.6 contain patches for this issue. As a workaround, disable the Circles app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-27T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wxx7-w5p4-7x4c" }, { "url": "https://github.com/nextcloud/circles/pull/1147" }, { "url": "https://hackerone.com/reports/1688199" } ], "source": { "advisory": "GHSA-wxx7-w5p4-7x4c", "discovery": "UNKNOWN" }, "title": "Database resource exhaustion for logged-in users via sharee recommendations with circles" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39330", "datePublished": "2022-10-27T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52508
Vulnerability from cvelistv5
Published
2024-11-15 17:34
Modified
2024-11-15 18:17
Severity ?
EPSS score ?
Summary
Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. When a user is trying to set up a mail account with an email address like user@example.tld that does not support auto configuration, and an attacker managed to register autoconfig.tld, the used email details would be send to the server of the attacker. It is recommended that the Nextcloud Mail app is upgraded to 1.14.6, 1.15.4, 2.2.11, 3.6.3, 3.7.7 or 4.0.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vmhx-hwph-q6mc | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/9964 | x_refsource_MISC | |
https://github.com/nextcloud/mail/commit/a84c70e15d814dab6f0e8eda71bbaaf48152079b | x_refsource_MISC | |
https://hackerone.com/reports/2508422 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.9.0, < 1.14.6 Version: >= 2.1.0, < 2.2.11 Version: >= 3.1.0, < 3.6.3 Version: >= 1.15.0, < 1.15.4 Version: >= 3.7.0, < 3.7.7 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:nextcloud:nextcloud_mail:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nextcloud_mail", "vendor": "nextcloud", "versions": [ { "lessThan": "1.14.6", "status": "affected", "version": "1.9.0", "versionType": "custom" }, { "lessThan": "2.2.11", "status": "affected", "version": "2.1.0", "versionType": "custom" }, { "lessThan": "3.6.3", "status": "affected", "version": "3.1.0", "versionType": "custom" }, { "lessThan": "15.4.0", "status": "affected", "version": "1.15.0", "versionType": "custom" }, { "lessThan": "3.7.7", "status": "affected", "version": "3.7.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-52508", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:12:55.485493Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:17:04.830Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.9.0, \u003c 1.14.6" }, { "status": "affected", "version": "\u003e= 2.1.0, \u003c 2.2.11" }, { "status": "affected", "version": "\u003e= 3.1.0, \u003c 3.6.3" }, { "status": "affected", "version": "\u003e= 1.15.0, \u003c 1.15.4" }, { "status": "affected", "version": "\u003e= 3.7.0, \u003c 3.7.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. When a user is trying to set up a mail account with an email address like user@example.tld that does not support auto configuration, and an attacker managed to register autoconfig.tld, the used email details would be send to the server of the attacker. It is recommended that the Nextcloud Mail app is upgraded to 1.14.6, 1.15.4, 2.2.11, 3.6.3, 3.7.7 or 4.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:34:21.900Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vmhx-hwph-q6mc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vmhx-hwph-q6mc" }, { "name": "https://github.com/nextcloud/mail/pull/9964", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/9964" }, { "name": "https://github.com/nextcloud/mail/commit/a84c70e15d814dab6f0e8eda71bbaaf48152079b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/commit/a84c70e15d814dab6f0e8eda71bbaaf48152079b" }, { "name": "https://hackerone.com/reports/2508422", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2508422" } ], "source": { "advisory": "GHSA-vmhx-hwph-q6mc", "discovery": "UNKNOWN" }, "title": "Nextcloud Mail auto configurator can be tricked into sending account information to wrong servers" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52508", "datePublished": "2024-11-15T17:34:21.900Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T18:17:04.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25161
Vulnerability from cvelistv5
Published
2023-02-13 20:22
Modified
2024-08-02 11:18
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 25.0.1 24.0.8, and 23.0.12 missing rate limiting on password reset functionality. This could result in service slowdown, storage overflow, or cost impact when using external email services. Users should upgrade to Nextcloud Server 25.0.1, 24.0.8, or 23.0.12 or Nextcloud Enterprise Server 25.0.1, 24.0.8, or 23.0.12 to receive a patch. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-492h-596q-xr2f | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/34632 | x_refsource_MISC | |
https://hackerone.com/reports/1691195 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: = 25.0.0 Version: >= 24.0.0, < 24.0.8 Version: < 23.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-492h-596q-xr2f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-492h-596q-xr2f" }, { "name": "https://github.com/nextcloud/server/pull/34632", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34632" }, { "name": "https://hackerone.com/reports/1691195", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1691195" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "= 25.0.0" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.8" }, { "status": "affected", "version": "\u003c 23.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 25.0.1 24.0.8, and 23.0.12 missing rate limiting on password reset functionality. This could result in service slowdown, storage overflow, or cost impact when using external email services. Users should upgrade to Nextcloud Server 25.0.1, 24.0.8, or 23.0.12 or Nextcloud Enterprise Server 25.0.1, 24.0.8, or 23.0.12 to receive a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T20:22:32.743Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-492h-596q-xr2f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-492h-596q-xr2f" }, { "name": "https://github.com/nextcloud/server/pull/34632", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/34632" }, { "name": "https://hackerone.com/reports/1691195", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1691195" } ], "source": { "advisory": "GHSA-492h-596q-xr2f", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s missing rate limiting on password reset functionality allows sending lots of emails" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25161", "datePublished": "2023-02-13T20:22:32.743Z", "dateReserved": "2023-02-03T16:59:18.245Z", "dateUpdated": "2024-08-02T11:18:35.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33183
Vulnerability from cvelistv5
Published
2023-05-30 05:01
Modified
2024-08-02 15:39
Severity ?
EPSS score ?
Summary
Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j | x_refsource_CONFIRM | |
https://github.com/nextcloud/calendar/pull/4938 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.5.5 Version: < 4.2.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:39:35.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j" }, { "name": "https://github.com/nextcloud/calendar/pull/4938", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/calendar/pull/4938" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.5.5" }, { "status": "affected", "version": "\u003c 4.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-30T05:01:55.759Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2792-2734-hr7j" }, { "name": "https://github.com/nextcloud/calendar/pull/4938", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/calendar/pull/4938" } ], "source": { "advisory": "GHSA-2792-2734-hr7j", "discovery": "UNKNOWN" }, "title": "Error in calendar when booking an appointment reveals the full path of the website" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33183", "datePublished": "2023-05-30T05:01:55.759Z", "dateReserved": "2023-05-17T22:25:50.697Z", "dateUpdated": "2024-08-02T15:39:35.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41971
Vulnerability from cvelistv5
Published
2022-12-01 20:55
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Nextcould Talk android is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0, guests can continue to receive video streams from a call after being removed from a conversation. An attacker would be able to see videos on a call in a public conversation after being removed from that conversation, provided that they were removed while being in the call. Versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0 contain patches for the issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wx6w-xpg9-6fv4 | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/7974 | x_refsource_MISC | |
https://hackerone.com/reports/1706248 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 12.2.8 Version: >= 13.0.0, < 13.0.10 Version: >= 14.0.0, < 14.0.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:39.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wx6w-xpg9-6fv4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wx6w-xpg9-6fv4" }, { "name": "https://github.com/nextcloud/spreed/pull/7974", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7974" }, { "name": "https://hackerone.com/reports/1706248", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1706248" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 12.2.8" }, { "status": "affected", "version": "\u003e= 13.0.0, \u003c 13.0.10" }, { "status": "affected", "version": "\u003e= 14.0.0, \u003c 14.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcould Talk android is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0, guests can continue to receive video streams from a call after being removed from a conversation. An attacker would be able to see videos on a call in a public conversation after being removed from that conversation, provided that they were removed while being in the call. Versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0 contain patches for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-01T20:55:46.040Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wx6w-xpg9-6fv4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wx6w-xpg9-6fv4" }, { "name": "https://github.com/nextcloud/spreed/pull/7974", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7974" }, { "name": "https://hackerone.com/reports/1706248", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1706248" } ], "source": { "advisory": "GHSA-wx6w-xpg9-6fv4", "discovery": "UNKNOWN" }, "title": "Nextcloud Talk guests can continue to receive video streams from call after being removed from a conversation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41971", "datePublished": "2022-12-01T20:55:46.040Z", "dateReserved": "2022-09-30T16:38:28.957Z", "dateUpdated": "2024-08-03T12:56:39.100Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35173
Vulnerability from cvelistv5
Published
2023-06-23 20:50
Modified
2024-08-02 16:23
Severity ?
EPSS score ?
Summary
Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37 | x_refsource_CONFIRM | |
https://github.com/nextcloud/end_to_end_encryption/pull/435 | x_refsource_MISC | |
https://hackerone.com/reports/1914115 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.12.0, < 1.12.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:23:59.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37" }, { "name": "https://github.com/nextcloud/end_to_end_encryption/pull/435", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/end_to_end_encryption/pull/435" }, { "name": "https://hackerone.com/reports/1914115", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1914115" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.12.0, \u003c 1.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T20:50:15.948Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37" }, { "name": "https://github.com/nextcloud/end_to_end_encryption/pull/435", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/end_to_end_encryption/pull/435" }, { "name": "https://hackerone.com/reports/1914115", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1914115" } ], "source": { "advisory": "GHSA-x7c7-v5r3-mg37", "discovery": "UNKNOWN" }, "title": "End-to-End encrypted file-drops can be made inaccessible" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35173", "datePublished": "2023-06-23T20:50:15.948Z", "dateReserved": "2023-06-14T14:17:52.180Z", "dateUpdated": "2024-08-02T16:23:59.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32678
Vulnerability from cvelistv5
Published
2021-07-12 12:25
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/27329 | x_refsource_MISC | |
https://hackerone.com/reports/1214158 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/27329" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1214158" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799: Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:11:28", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/27329" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1214158" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-48rx-3gmf-g74j", "discovery": "UNKNOWN" }, "title": "Ratelimit not applied on OCS API responses", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32678", "STATE": "PUBLIC", "TITLE": "Ratelimit not applied on OCS API responses" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-799: Improper Control of Interaction Frequency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j" }, { "name": "https://github.com/nextcloud/server/pull/27329", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/27329" }, { "name": "https://hackerone.com/reports/1214158", "refsource": "MISC", "url": "https://hackerone.com/reports/1214158" }, { "name": "FEDORA-2021-9b421b78af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-48rx-3gmf-g74j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32678", "datePublished": "2021-07-12T12:25:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37314
Vulnerability from cvelistv5
Published
2024-06-14 15:05
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
Nextcloud Photos is a photo management app. Users can remove photos from the album of registered users. It is recommended that the Nextcloud Server is upgraded to 25.0.7 or 26.0.2 and the Nextcloud Enterprise Server is upgraded to 25.0.7 or 26.0.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9chh-5prm-wp43 | x_refsource_CONFIRM | |
https://github.com/nextcloud/photos/pull/1749 | x_refsource_MISC | |
https://hackerone.com/reports/1946298 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.1, < 25.0.7 Version: >= 26.0.0, < 26.0.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37314", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T18:14:03.328991Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T14:25:26.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:56.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9chh-5prm-wp43", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9chh-5prm-wp43" }, { "name": "https://github.com/nextcloud/photos/pull/1749", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/photos/pull/1749" }, { "name": "https://hackerone.com/reports/1946298", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1946298" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.1, \u003c 25.0.7" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Photos is a photo management app. Users can remove photos from the album of registered users. It is recommended that the Nextcloud Server is upgraded to 25.0.7 or 26.0.2 and the Nextcloud Enterprise Server is upgraded to 25.0.7 or 26.0.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:05:48.284Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9chh-5prm-wp43", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9chh-5prm-wp43" }, { "name": "https://github.com/nextcloud/photos/pull/1749", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/photos/pull/1749" }, { "name": "https://hackerone.com/reports/1946298", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1946298" } ], "source": { "advisory": "GHSA-9chh-5prm-wp43", "discovery": "UNKNOWN" }, "title": "Nextcloud Photos\u0027 shared albums have no restriction on photo removal" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37314", "datePublished": "2024-06-14T15:05:48.284Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:56.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48307
Vulnerability from cvelistv5
Published
2023-11-21 22:22
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. Starting in version 1.13.0 and prior to version 2.2.8 and 3.3.0, an attacker can use an unprotected endpoint in the Mail app to perform a SSRF attack. Nextcloud Mail app versions 2.2.8 and 3.3.0 contain a patch for this issue. As a workaround, disable the mail app.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/8709 | x_refsource_MISC | |
https://hackerone.com/reports/1869714 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.13.0, < 2.2.8 Version: >= 3.1.0, < 3.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999" }, { "name": "https://github.com/nextcloud/mail/pull/8709", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/8709" }, { "name": "https://hackerone.com/reports/1869714", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1869714" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.13.0, \u003c 2.2.8" }, { "status": "affected", "version": "\u003e= 3.1.0, \u003c 3.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. Starting in version 1.13.0 and prior to version 2.2.8 and 3.3.0, an attacker can use an unprotected endpoint in the Mail app to perform a SSRF attack. Nextcloud Mail app versions 2.2.8 and 3.3.0 contain a patch for this issue. As a workaround, disable the mail app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T22:22:56.780Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999" }, { "name": "https://github.com/nextcloud/mail/pull/8709", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/8709" }, { "name": "https://hackerone.com/reports/1869714", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1869714" } ], "source": { "advisory": "GHSA-4pp4-m8ph-2999", "discovery": "UNKNOWN" }, "title": "Nextcloud Mail app vulnerable to Server-Side Request Forgery" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48307", "datePublished": "2023-11-21T22:22:56.780Z", "dateReserved": "2023-11-14T17:41:15.572Z", "dateUpdated": "2024-08-02T21:23:39.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32320
Vulnerability from cvelistv5
Published
2023-06-22 20:57
Modified
2024-12-05 17:32
Severity ?
EPSS score ?
Summary
Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38274 | x_refsource_MISC | |
https://hackerone.com/reports/1918525 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: Nextcloud Server >= 25.0.0, < 25.0.7 Version: Nextcloud Server >= 26.0.0, < 26.0.2 Version: Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12 Version: Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12 Version: Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7 Version: Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2 Version: Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 Version: Nextcloud Enterprise Server >= 26.0.0, < 26.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg" }, { "name": "https://github.com/nextcloud/server/pull/38274", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38274" }, { "name": "https://hackerone.com/reports/1918525", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1918525" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32320", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T17:32:18.959616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T17:32:28.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "Nextcloud Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Server \u003e= 26.0.0, \u003c 26.0.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 21.0.0, \u003c 21.0.9.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 22.0.0, \u003c 22.2.10.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 23.0.0, \u003c 23.0.12.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 24.0.0, \u003c 24.0.12.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 26.0.0, \u003c 26.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a data storage system for Nextcloud, a self-hosted productivity platform. When multiple requests are sent in parallel, all of them were executed even if the amount of faulty requests succeeded the limit by the time the response was sent to the client. This allowed someone to send as many requests the server could handle in parallel to bruteforce protected details instead of the configured limit, default 8. Nextcloud Server versions 25.0.7 and 26.0.2 and Nextcloud Enterprise Server versions 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7 and 26.0.2 contain patches for this issue.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-22T20:57:54.832Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qphh-6xh7-vffg" }, { "name": "https://github.com/nextcloud/server/pull/38274", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38274" }, { "name": "https://hackerone.com/reports/1918525", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1918525" } ], "source": { "advisory": "GHSA-qphh-6xh7-vffg", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s brute force protection allows someone to send more requests than intended" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32320", "datePublished": "2023-06-22T20:57:54.832Z", "dateReserved": "2023-05-08T13:26:03.879Z", "dateUpdated": "2024-12-05T17:32:28.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37631
Vulnerability from cvelistv5
Published
2021-09-07 19:50
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/3217 | x_refsource_MISC | |
https://hackerone.com/reports/1256021 | x_refsource_MISC | |
https://hackerone.com/reports/1280931 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.2.9 Version: >= 1.3.0, < 1.4.4 Version: >= 1.5.0, < 1.5.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.348Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/3217" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1256021" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1280931" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.2.9" }, { "status": "affected", "version": "\u003e= 1.3.0, \u003c 1.4.4" }, { "status": "affected", "version": "\u003e= 1.5.0, \u003c 1.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn\u0027t properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-07T19:50:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/3217" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1256021" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1280931" } ], "source": { "advisory": "GHSA-4mxp-j277-82hr", "discovery": "UNKNOWN" }, "title": "Circle can be accessed by non-Circle members in Nextcloud Deck", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37631", "STATE": "PUBLIC", "TITLE": "Circle can be accessed by non-Circle members in Nextcloud Deck" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.2.9" }, { "version_value": "\u003e= 1.3.0, \u003c 1.4.4" }, { "version_value": "\u003e= 1.5.0, \u003c 1.5.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn\u0027t properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639: Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr" }, { "name": "https://github.com/nextcloud/deck/pull/3217", "refsource": "MISC", "url": "https://github.com/nextcloud/deck/pull/3217" }, { "name": "https://hackerone.com/reports/1256021", "refsource": "MISC", "url": "https://hackerone.com/reports/1256021" }, { "name": "https://hackerone.com/reports/1280931", "refsource": "MISC", "url": "https://hackerone.com/reports/1280931" } ] }, "source": { "advisory": "GHSA-4mxp-j277-82hr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37631", "datePublished": "2021-09-07T19:50:11", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.348Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32695
Vulnerability from cvelistv5
Published
2021-06-17 20:50
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose the malicious app. The shared preferences contain some limited private data such as push tokens and the account name. The vulnerability is patched in version 3.16.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-25m9-cf6c-qf2c | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/8433 | x_refsource_MISC | |
https://hackerone.com/reports/1142918 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.16.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.133Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-25m9-cf6c-qf2c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/8433" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1142918" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.16.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose the malicious app. The shared preferences contain some limited private data such as push tokens and the account name. The vulnerability is patched in version 3.16.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-17T20:50:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-25m9-cf6c-qf2c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/8433" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1142918" } ], "source": { "advisory": "GHSA-25m9-cf6c-qf2c", "discovery": "UNKNOWN" }, "title": "Malicious Android app could access Shared Preferences of the Nextcloud Android client", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32695", "STATE": "PUBLIC", "TITLE": "Malicious Android app could access Shared Preferences of the Nextcloud Android client" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.16.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose the malicious app. The shared preferences contain some limited private data such as push tokens and the account name. The vulnerability is patched in version 3.16.1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-25m9-cf6c-qf2c", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-25m9-cf6c-qf2c" }, { "name": "https://github.com/nextcloud/android/pull/8433", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/8433" }, { "name": "https://hackerone.com/reports/1142918", "refsource": "MISC", "url": "https://hackerone.com/reports/1142918" } ] }, "source": { "advisory": "GHSA-25m9-cf6c-qf2c", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32695", "datePublished": "2021-06-17T20:50:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.133Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24885
Vulnerability from cvelistv5
Published
2022-04-27 13:20
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-32j4-9xf3-h2mg | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/9816 | x_refsource_MISC | |
https://hackerone.com/reports/1450368 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.19.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-32j4-9xf3-h2mg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/9816" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1450368" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.19.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T13:20:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-32j4-9xf3-h2mg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/9816" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1450368" } ], "source": { "advisory": "GHSA-32j4-9xf3-h2mg", "discovery": "UNKNOWN" }, "title": "Improper Authentication in Nextcloud Android Files", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24885", "STATE": "PUBLIC", "TITLE": "Improper Authentication in Nextcloud Android Files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.19.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-32j4-9xf3-h2mg", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-32j4-9xf3-h2mg" }, { "name": "https://github.com/nextcloud/android/pull/9816", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/9816" }, { "name": "https://hackerone.com/reports/1450368", "refsource": "MISC", "url": "https://hackerone.com/reports/1450368" } ] }, "source": { "advisory": "GHSA-32j4-9xf3-h2mg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24885", "datePublished": "2022-04-27T13:20:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31119
Vulnerability from cvelistv5
Published
2022-08-04 17:15
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions of Nextcloud mail would log user passwords to disk in the event of a misconfiguration. Should an attacker gain access to the logs complete access to affected accounts would be obtainable. It is recommended that the Nextcloud Mail is upgraded to 1.12.1. Operators should inspect their logs and remove passwords which have been logged. There are no workarounds to prevent logging in the event of a misconfiguration.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-63m3-w68h-3wjg | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/issues/823 | x_refsource_MISC | |
https://github.com/nextcloud/mail/pull/6488/commits/ab9ade57fbc1f465ffe905248f93f328d638d7e5 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.12.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-63m3-w68h-3wjg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/issues/823" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/6488/commits/ab9ade57fbc1f465ffe905248f93f328d638d7e5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions of Nextcloud mail would log user passwords to disk in the event of a misconfiguration. Should an attacker gain access to the logs complete access to affected accounts would be obtainable. It is recommended that the Nextcloud Mail is upgraded to 1.12.1. Operators should inspect their logs and remove passwords which have been logged. There are no workarounds to prevent logging in the event of a misconfiguration." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T17:15:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-63m3-w68h-3wjg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/issues/823" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/6488/commits/ab9ade57fbc1f465ffe905248f93f328d638d7e5" } ], "source": { "advisory": "GHSA-63m3-w68h-3wjg", "discovery": "UNKNOWN" }, "title": "Password disclosure in log file in Nextcloud Mail App", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31119", "STATE": "PUBLIC", "TITLE": "Password disclosure in log file in Nextcloud Mail App" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.12.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions of Nextcloud mail would log user passwords to disk in the event of a misconfiguration. Should an attacker gain access to the logs complete access to affected accounts would be obtainable. It is recommended that the Nextcloud Mail is upgraded to 1.12.1. Operators should inspect their logs and remove passwords which have been logged. There are no workarounds to prevent logging in the event of a misconfiguration." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532: Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-63m3-w68h-3wjg", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-63m3-w68h-3wjg" }, { "name": "https://github.com/nextcloud/mail/issues/823", "refsource": "MISC", "url": "https://github.com/nextcloud/mail/issues/823" }, { "name": "https://github.com/nextcloud/mail/pull/6488/commits/ab9ade57fbc1f465ffe905248f93f328d638d7e5", "refsource": "MISC", "url": "https://github.com/nextcloud/mail/pull/6488/commits/ab9ade57fbc1f465ffe905248f93f328d638d7e5" } ] }, "source": { "advisory": "GHSA-63m3-w68h-3wjg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31119", "datePublished": "2022-08-04T17:15:17", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41970
Vulnerability from cvelistv5
Published
2022-12-01 20:54
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Nextcloud Server is an open source personal cloud server. Prior to versions 24.0.7 and 25.0.1, disabled download shares still allow download through preview images. Images could be downloaded and previews of documents (first page) can be downloaded without being watermarked. Versions 24.0.7 and 25.0.1 contain a fix for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9mh6-cph8-772c | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/34788 | x_refsource_MISC | |
https://hackerone.com/reports/1745766 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 24.0.7 Version: >= 25.0.0, < 25.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:39.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9mh6-cph8-772c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9mh6-cph8-772c" }, { "name": "https://github.com/nextcloud/server/pull/34788", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34788" }, { "name": "https://hackerone.com/reports/1745766", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1745766" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 24.0.7" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is an open source personal cloud server. Prior to versions 24.0.7 and 25.0.1, disabled download shares still allow download through preview images. Images could be downloaded and previews of documents (first page) can be downloaded without being watermarked. Versions 24.0.7 and 25.0.1 contain a fix for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-01T20:54:37.460Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9mh6-cph8-772c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9mh6-cph8-772c" }, { "name": "https://github.com/nextcloud/server/pull/34788", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/34788" }, { "name": "https://hackerone.com/reports/1745766", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1745766" } ], "source": { "advisory": "GHSA-9mh6-cph8-772c", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s disabled download shares still allow download through preview images" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41970", "datePublished": "2022-12-01T20:54:37.460Z", "dateReserved": "2022-09-30T16:38:28.957Z", "dateUpdated": "2024-08-03T12:56:39.097Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-30540
Vulnerability from cvelistv5
Published
2023-04-17 21:32
Modified
2024-08-02 14:28
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a chat, video & audio call extension for Nextcloud. In affected versions a user that was added later to a conversation can use this information to get access to data that was deleted before they were added to the conversation. This issue has been patched in version 15.0.5 and it is recommended that users upgrad to 15.0.5. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/8985 | x_refsource_MISC | |
https://hackerone.com/reports/1894676 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 15.0.0, < 15.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:28:51.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw" }, { "name": "https://github.com/nextcloud/spreed/pull/8985", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/8985" }, { "name": "https://hackerone.com/reports/1894676", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1894676" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 15.0.0, \u003c 15.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a chat, video \u0026 audio call extension for Nextcloud. In affected versions a user that was added later to a conversation can use this information to get access to data that was deleted before they were added to the conversation. This issue has been patched in version 15.0.5 and it is recommended that users upgrad to 15.0.5. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-17T21:32:29.470Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw" }, { "name": "https://github.com/nextcloud/spreed/pull/8985", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/8985" }, { "name": "https://hackerone.com/reports/1894676", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1894676" } ], "source": { "advisory": "GHSA-c9hr-cq65-9mjw", "discovery": "UNKNOWN" }, "title": "Chat poll data can still be queried from API after purging history in Nextcloud talk" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-30540", "datePublished": "2023-04-17T21:32:29.470Z", "dateReserved": "2023-04-12T15:19:33.766Z", "dateUpdated": "2024-08-02T14:28:51.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22402
Vulnerability from cvelistv5
Published
2024-01-18 20:23
Modified
2024-08-01 22:43
Severity ?
EPSS score ?
Summary
Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users were able to load the first page of apps they were actually not allowed to access. Depending on the selection of apps installed this may present a permissions bypass. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj | x_refsource_CONFIRM | |
https://github.com/nextcloud/guests/pull/1082 | x_refsource_MISC | |
https://hackerone.com/reports/2251074 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 2.4.0, < 2.4.1 Version: >= 2.5.0, < 2.5.1 Version: >= 3.0.0, < 3.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj" }, { "name": "https://github.com/nextcloud/guests/pull/1082", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/guests/pull/1082" }, { "name": "https://hackerone.com/reports/2251074", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2251074" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 2.4.0, \u003c 2.4.1" }, { "status": "affected", "version": "\u003e= 2.5.0, \u003c 2.5.1" }, { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users were able to load the first page of apps they were actually not allowed to access. Depending on the selection of apps installed this may present a permissions bypass. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-19T12:46:30.558Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v3qw-7vgv-2fxj" }, { "name": "https://github.com/nextcloud/guests/pull/1082", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/guests/pull/1082" }, { "name": "https://hackerone.com/reports/2251074", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2251074" } ], "source": { "advisory": "GHSA-v3qw-7vgv-2fxj", "discovery": "UNKNOWN" }, "title": "Improper handling of request URLs in Nextcloud Guests app allows guest users to bypass app allowlist" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22402", "datePublished": "2024-01-18T20:23:54.714Z", "dateReserved": "2024-01-10T15:09:55.547Z", "dateUpdated": "2024-08-01T22:43:34.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32679
Vulnerability from cvelistv5
Published
2021-07-12 12:50
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, filenames where not escaped by default in controllers using `DownloadResponse`. When a user-supplied filename was passed unsanitized into a `DownloadResponse`, this could be used to trick users into downloading malicious files with a benign file extension. This would show in UI behaviours where Nextcloud applications would display a benign file extension (e.g. JPEG), but the file will actually be downloaded with an executable file extension. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. Administrators of Nextcloud instances do not have a workaround available, but developers of Nextcloud apps may manually escape the file name before passing it into `DownloadResponse`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/27354 | x_refsource_MISC | |
https://hackerone.com/reports/1215263 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/27354" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1215263" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, filenames where not escaped by default in controllers using `DownloadResponse`. When a user-supplied filename was passed unsanitized into a `DownloadResponse`, this could be used to trick users into downloading malicious files with a benign file extension. This would show in UI behaviours where Nextcloud applications would display a benign file extension (e.g. JPEG), but the file will actually be downloaded with an executable file extension. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. Administrators of Nextcloud instances do not have a workaround available, but developers of Nextcloud apps may manually escape the file name before passing it into `DownloadResponse`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116: Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:07:04", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/27354" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1215263" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-3hjp-26x8-mhf6", "discovery": "UNKNOWN" }, "title": "Filenames not escaped by default in controllers using DownloadResponse", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32679", "STATE": "PUBLIC", "TITLE": "Filenames not escaped by default in controllers using DownloadResponse" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, filenames where not escaped by default in controllers using `DownloadResponse`. When a user-supplied filename was passed unsanitized into a `DownloadResponse`, this could be used to trick users into downloading malicious files with a benign file extension. This would show in UI behaviours where Nextcloud applications would display a benign file extension (e.g. JPEG), but the file will actually be downloaded with an executable file extension. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. Administrators of Nextcloud instances do not have a workaround available, but developers of Nextcloud apps may manually escape the file name before passing it into `DownloadResponse`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-116: Improper Encoding or Escaping of Output" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6" }, { "name": "https://github.com/nextcloud/server/pull/27354", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/27354" }, { "name": "https://hackerone.com/reports/1215263", "refsource": "MISC", "url": "https://hackerone.com/reports/1215263" }, { "name": "FEDORA-2021-9b421b78af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-3hjp-26x8-mhf6", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32679", "datePublished": "2021-07-12T12:50:10", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49792
Vulnerability from cvelistv5
Published
2023-12-22 16:31
Modified
2024-08-27 15:47
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/41526 | x_refsource_MISC | |
https://hackerone.com/reports/2230915 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 23.0.0, < 23.0.12.13 Version: >= 24.0.0, < 24.0.12.9 Version: >= 25.0.0, < 25.0.13.4 Version: >= 26.0.0, < 26.0.9 Version: >= 27.0.0, < 27.1.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98" }, { "name": "https://github.com/nextcloud/server/pull/41526", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/41526" }, { "name": "https://hackerone.com/reports/2230915", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2230915" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49792", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:45:51.455561Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:47:21.783Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.13" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.9" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.13.4" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.9" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-22T16:31:17.833Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98" }, { "name": "https://github.com/nextcloud/server/pull/41526", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/41526" }, { "name": "https://hackerone.com/reports/2230915", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2230915" } ], "source": { "advisory": "GHSA-5j2p-q736-hw98", "discovery": "UNKNOWN" }, "title": "Bruteforce protection can be bypassed with misconfigured proxy" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49792", "datePublished": "2023-12-22T16:31:17.833Z", "dateReserved": "2023-11-30T13:39:50.863Z", "dateUpdated": "2024-08-27T15:47:21.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22403
Vulnerability from cvelistv5
Published
2024-01-18 20:03
Modified
2024-08-01 22:43
Severity ?
EPSS score ?
Summary
Nextcloud server is a self hosted personal cloud system. In affected versions OAuth codes did not expire. When an attacker would get access to an authorization code they could authenticate at any time using the code. As of version 28.0.0 OAuth codes are invalidated after 10 minutes and will no longer be authenticated. To exploit this vulnerability an attacker would need to intercept an OAuth code from a user session. It is recommended that the Nextcloud Server is upgraded to 28.0.0. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 28.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wppc-f5g8-vx36", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wppc-f5g8-vx36" }, { "name": "https://github.com/nextcloud/server/pull/40766", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/40766" }, { "name": "https://hackerone.com/reports/1784162", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1784162" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S6PN4GVJ5TZUC6WSG4X3ZA3AMPBEKNAX/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 28.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is a self hosted personal cloud system. In affected versions OAuth codes did not expire. When an attacker would get access to an authorization code they could authenticate at any time using the code. As of version 28.0.0 OAuth codes are invalidated after 10 minutes and will no longer be authenticated. To exploit this vulnerability an attacker would need to intercept an OAuth code from a user session. It is recommended that the Nextcloud Server is upgraded to 28.0.0. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T20:03:30.623Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wppc-f5g8-vx36", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wppc-f5g8-vx36" }, { "name": "https://github.com/nextcloud/server/pull/40766", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/40766" }, { "name": "https://hackerone.com/reports/1784162", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1784162" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S6PN4GVJ5TZUC6WSG4X3ZA3AMPBEKNAX/" } ], "source": { "advisory": "GHSA-wppc-f5g8-vx36", "discovery": "UNKNOWN" }, "title": "OAuth2 authorization codes are valid indefinetly in Nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22403", "datePublished": "2024-01-18T20:03:30.623Z", "dateReserved": "2024-01-10T15:09:55.548Z", "dateUpdated": "2024-08-01T22:43:34.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37312
Vulnerability from cvelistv5
Published
2024-06-14 14:43
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
user_oidc app is an OpenID Connect user backend for Nextcloud. Missing access control on the ID4me endpoint allows an attacker to register an account eventually getting access to data that is available to all registered users. It is recommended that the OpenID Connect user backend is upgraded to 3.0.0 (Nextcloud 20-23), 4.0.0 (Nexcloud 24) or 5.0.0 (Nextcloud 25-28).
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2 | x_refsource_MISC | |
https://hackerone.com/reports/2376929 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: <= 1.3.6 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:nextcloud:user_oidc:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "user_oidc", "vendor": "nextcloud", "versions": [ { "lessThanOrEqual": "1.3.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37312", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T17:15:53.717769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T17:15:56.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q" }, { "name": "https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2" }, { "name": "https://hackerone.com/reports/2376929", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2376929" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c= 1.3.6" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc app is an OpenID Connect user backend for Nextcloud. Missing access control on the ID4me endpoint allows an attacker to register an account eventually getting access to data that is available to all registered users. It is recommended that the OpenID Connect user backend is upgraded to 3.0.0 (Nextcloud 20-23), 4.0.0 (Nexcloud 24) or 5.0.0 (Nextcloud 25-28).\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T14:43:24.137Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q" }, { "name": "https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2" }, { "name": "https://hackerone.com/reports/2376929", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2376929" } ], "source": { "advisory": "GHSA-vw7g-959g-vj6q", "discovery": "UNKNOWN" }, "title": "Nextcloud user_oidc app\u0027s ID4me feature is available even when disabled" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37312", "datePublished": "2024-06-14T14:43:24.137Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:55.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52509
Vulnerability from cvelistv5
Published
2024-11-15 17:37
Modified
2024-11-15 18:11
Severity ?
EPSS score ?
Summary
Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This allowed users to send them the files to themselves and then downloading it from their mail clients. It is recommended that the Nextcloud Mail is upgraded to 2.2.10, 3.6.2 or 3.7.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/9592 | x_refsource_MISC | |
https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b | x_refsource_MISC | |
https://hackerone.com/reports/1878255 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >=2.2.0, < 2.2.10 Version: >= 3.6.0, < 3.6.2 Version: >= 3.7.0, < 3.7.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:11:39.753390Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:11:49.618Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e=2.2.0, \u003c 2.2.10" }, { "status": "affected", "version": "\u003e= 3.6.0, \u003c 3.6.2" }, { "status": "affected", "version": "\u003e= 3.7.0, \u003c 3.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This allowed users to send them the files to themselves and then downloading it from their mail clients. It is recommended that the Nextcloud Mail is upgraded to 2.2.10, 3.6.2 or 3.7.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:37:47.035Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862" }, { "name": "https://github.com/nextcloud/mail/pull/9592", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/9592" }, { "name": "https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b" }, { "name": "https://hackerone.com/reports/1878255", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1878255" } ], "source": { "advisory": "GHSA-pwpp-fvcr-w862", "discovery": "UNKNOWN" }, "title": "Nextcloud Mail app does not respect download permissions in shares" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52509", "datePublished": "2024-11-15T17:37:47.035Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T18:11:49.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32725
Vulnerability from cvelistv5
Published
2021-07-12 19:30
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/26946 | x_refsource_MISC | |
https://hackerone.com/reports/1178320 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/26946" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1178320" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-277", "description": "CWE-277: Insecure Inherited Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:08:31", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/26946" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1178320" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-6f6v-h9x9-jj4v", "discovery": "UNKNOWN" }, "title": "Default share permissions not respected for federated reshares", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32725", "STATE": "PUBLIC", "TITLE": "Default share permissions not respected for federated reshares" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-277: Insecure Inherited Permissions" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v" }, { "name": "https://github.com/nextcloud/server/pull/26946", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/26946" }, { "name": "https://hackerone.com/reports/1178320", "refsource": "MISC", "url": "https://hackerone.com/reports/1178320" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-6f6v-h9x9-jj4v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32725", "datePublished": "2021-07-12T19:30:14", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32707
Vulnerability from cvelistv5
Published
2021-07-12 19:05
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Mail is a mail app for Nextcloud. In versions prior to 1.9.6, the Nextcloud Mail application does not, by default, render images in emails to not leak the read state. The privacy filter failed to filter images with a `background-image` CSS attribute. Note that the images were still passed through the Nextcloud image proxy, and thus there was no IP leakage. The issue was patched in version 1.9.6 and 1.10.0. No workarounds are known to exist.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/5189 | x_refsource_MISC | |
https://hackerone.com/reports/1215251 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.9.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/5189" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1215251" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.9.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is a mail app for Nextcloud. In versions prior to 1.9.6, the Nextcloud Mail application does not, by default, render images in emails to not leak the read state. The privacy filter failed to filter images with a `background-image` CSS attribute. Note that the images were still passed through the Nextcloud image proxy, and thus there was no IP leakage. The issue was patched in version 1.9.6 and 1.10.0. No workarounds are known to exist." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T19:05:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/5189" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1215251" } ], "source": { "advisory": "GHSA-xxp4-44xc-8crh", "discovery": "UNKNOWN" }, "title": "Bypass of image blocking in Nextcloud Mail", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32707", "STATE": "PUBLIC", "TITLE": "Bypass of image blocking in Nextcloud Mail" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.9.6" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Mail is a mail app for Nextcloud. In versions prior to 1.9.6, the Nextcloud Mail application does not, by default, render images in emails to not leak the read state. The privacy filter failed to filter images with a `background-image` CSS attribute. Note that the images were still passed through the Nextcloud image proxy, and thus there was no IP leakage. The issue was patched in version 1.9.6 and 1.10.0. No workarounds are known to exist." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh" }, { "name": "https://github.com/nextcloud/mail/pull/5189", "refsource": "MISC", "url": "https://github.com/nextcloud/mail/pull/5189" }, { "name": "https://hackerone.com/reports/1215251", "refsource": "MISC", "url": "https://hackerone.com/reports/1215251" } ] }, "source": { "advisory": "GHSA-xxp4-44xc-8crh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32707", "datePublished": "2021-07-12T19:05:13", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39957
Vulnerability from cvelistv5
Published
2023-08-10 15:04
Modified
2024-10-04 18:59
Severity ?
EPSS score ?
Summary
Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj | x_refsource_CONFIRM | |
https://github.com/nextcloud/talk-android/pull/3064 | x_refsource_MISC | |
https://hackerone.com/reports/1997029 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 17.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj" }, { "name": "https://github.com/nextcloud/talk-android/pull/3064", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/talk-android/pull/3064" }, { "name": "https://hackerone.com/reports/1997029", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1997029" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "talk", "vendor": "nextcloud", "versions": [ { "lessThan": "17.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39957", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:16:40.418172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T18:59:32.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 17.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T15:04:16.233Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj" }, { "name": "https://github.com/nextcloud/talk-android/pull/3064", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/talk-android/pull/3064" }, { "name": "https://hackerone.com/reports/1997029", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1997029" } ], "source": { "advisory": "GHSA-36f7-93f3-mcfj", "discovery": "UNKNOWN" }, "title": "Path traversal allows tricking the Talk Android app into writing files into it\u0027s root directory" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39957", "datePublished": "2023-08-10T15:04:16.233Z", "dateReserved": "2023-08-07T16:27:27.075Z", "dateUpdated": "2024-10-04T18:59:32.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37317
Vulnerability from cvelistv5
Published
2024-06-14 15:25
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
The Nextcloud Notes app is a distraction free notes taking app for Nextcloud. If an attacker managed to share a folder called `Notes/` with a newly created user before they logged in, the Notes app would use that folder store the personal notes. It is recommended that the Nextcloud Notes app is upgraded to 4.9.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wfqv-cx85-7rjx | x_refsource_CONFIRM | |
https://github.com/nextcloud/notes/pull/1260 | x_refsource_MISC | |
https://hackerone.com/reports/2254151 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 4.6.0, < 4.9.3 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37317", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T16:56:59.491277Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T16:57:05.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wfqv-cx85-7rjx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wfqv-cx85-7rjx" }, { "name": "https://github.com/nextcloud/notes/pull/1260", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/notes/pull/1260" }, { "name": "https://hackerone.com/reports/2254151", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2254151" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 4.6.0, \u003c 4.9.3" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Notes app is a distraction free notes taking app for Nextcloud. If an attacker managed to share a folder called `Notes/` with a newly created user before they logged in, the Notes app would use that folder store the personal notes. It is recommended that the Nextcloud Notes app is upgraded to 4.9.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:25:24.475Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wfqv-cx85-7rjx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wfqv-cx85-7rjx" }, { "name": "https://github.com/nextcloud/notes/pull/1260", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/notes/pull/1260" }, { "name": "https://hackerone.com/reports/2254151", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2254151" } ], "source": { "advisory": "GHSA-wfqv-cx85-7rjx", "discovery": "UNKNOWN" }, "title": "Nextcloud Notes app can be tricked into using a received share created before the user logged in" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37317", "datePublished": "2024-06-14T15:25:24.475Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:55.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39339
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vff-cq8h-chhg" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/495" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1687005" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319: Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vff-cq8h-chhg" }, { "url": "https://github.com/nextcloud/user_oidc/pull/495" }, { "url": "https://hackerone.com/reports/1687005" } ], "source": { "advisory": "GHSA-2vff-cq8h-chhg", "discovery": "UNKNOWN" }, "title": "Cleartext Transmission of Sensitive Information in user_oidc" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39339", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52521
Vulnerability from cvelistv5
Published
2024-11-15 16:38
Modified
2024-11-15 17:04
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/47769 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.10 Version: >= 29.0.0, < 29.0.7 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:04:05.765293Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:04:24.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.10" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-328", "description": "CWE-328: Use of Weak Hash", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:38:49.174Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4" }, { "name": "https://github.com/nextcloud/server/pull/47769", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/47769" }, { "name": "https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d" } ], "source": { "advisory": "GHSA-2q6f-gjgj-7hp4", "discovery": "UNKNOWN" }, "title": "Nextcloud Server has a potential hash collision for background jobs could skip queuing them" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52521", "datePublished": "2024-11-15T16:38:49.174Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T17:04:24.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22400
Vulnerability from cvelistv5
Published
2024-01-18 19:21
Modified
2024-08-01 22:43
Severity ?
EPSS score ?
Summary
Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7 | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_saml/pull/788 | x_refsource_MISC | |
https://github.com/nextcloud/user_saml/commit/b184304a476deeba36e92b70562d5de7c2f85f8a | x_refsource_MISC | |
https://hackerone.com/reports/2263044 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 5.0.0, < 5.1.5 Version: >= 5.2.0, < 5.2.5 Version: >= 6.0.0, < 6.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7" }, { "name": "https://github.com/nextcloud/user_saml/pull/788", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_saml/pull/788" }, { "name": "https://github.com/nextcloud/user_saml/commit/b184304a476deeba36e92b70562d5de7c2f85f8a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_saml/commit/b184304a476deeba36e92b70562d5de7c2f85f8a" }, { "name": "https://hackerone.com/reports/2263044", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2263044" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.1.5" }, { "status": "affected", "version": "\u003e= 5.2.0, \u003c 5.2.5" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T19:21:06.618Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7" }, { "name": "https://github.com/nextcloud/user_saml/pull/788", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_saml/pull/788" }, { "name": "https://github.com/nextcloud/user_saml/commit/b184304a476deeba36e92b70562d5de7c2f85f8a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_saml/commit/b184304a476deeba36e92b70562d5de7c2f85f8a" }, { "name": "https://hackerone.com/reports/2263044", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2263044" } ], "source": { "advisory": "GHSA-622q-xhfr-xmv7", "discovery": "UNKNOWN" }, "title": "Open redirect in user_saml via RelayState parameter in Nextcloud User Saml" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22400", "datePublished": "2024-01-18T19:21:06.618Z", "dateReserved": "2024-01-10T15:09:55.546Z", "dateUpdated": "2024-08-01T22:43:34.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22401
Vulnerability from cvelistv5
Published
2024-01-18 20:23
Modified
2024-10-21 11:42
Severity ?
EPSS score ?
Summary
Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users could change the allowed list of apps, allowing them to use apps that were not intended to be used. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wr87-hx3w-29hh | x_refsource_CONFIRM | |
https://github.com/nextcloud/guests/pull/1082 | x_refsource_MISC | |
https://hackerone.com/reports/2250398 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 2.4.0, < 2.4.1 Version: >= 2.5.0, < 2.5.1 Version: >= 3.0.0, < 3.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wr87-hx3w-29hh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wr87-hx3w-29hh" }, { "name": "https://github.com/nextcloud/guests/pull/1082", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/guests/pull/1082" }, { "name": "https://hackerone.com/reports/2250398", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2250398" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22401", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-22T15:12:49.328732Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T11:42:04.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 2.4.0, \u003c 2.4.1" }, { "status": "affected", "version": "\u003e= 2.5.0, \u003c 2.5.1" }, { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users could change the allowed list of apps, allowing them to use apps that were not intended to be used. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T20:23:52.765Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wr87-hx3w-29hh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wr87-hx3w-29hh" }, { "name": "https://github.com/nextcloud/guests/pull/1082", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/guests/pull/1082" }, { "name": "https://hackerone.com/reports/2250398", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2250398" } ], "source": { "advisory": "GHSA-wr87-hx3w-29hh", "discovery": "UNKNOWN" }, "title": "All users can reset the allowed apps list for Nextcloud Guest App users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22401", "datePublished": "2024-01-18T20:23:52.765Z", "dateReserved": "2024-01-10T15:09:55.547Z", "dateUpdated": "2024-10-21T11:42:04.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49790
Vulnerability from cvelistv5
Published
2023-12-22 16:19
Modified
2024-08-02 22:01
Severity ?
EPSS score ?
Summary
The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv | x_refsource_CONFIRM | |
https://github.com/nextcloud/ios/pull/2665 | x_refsource_MISC | |
https://hackerone.com/reports/2245437 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 4.9.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:26.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv" }, { "name": "https://github.com/nextcloud/ios/pull/2665", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/ios/pull/2665" }, { "name": "https://hackerone.com/reports/2245437", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2245437" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 4.9.2" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-22T16:19:28.440Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv" }, { "name": "https://github.com/nextcloud/ios/pull/2665", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/ios/pull/2665" }, { "name": "https://hackerone.com/reports/2245437", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2245437" } ], "source": { "advisory": "GHSA-j8g7-88vv-rggv", "discovery": "UNKNOWN" }, "title": "App PIN code can be bypassed in Nextcloud Files iOS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49790", "datePublished": "2023-12-22T16:19:28.440Z", "dateReserved": "2023-11-30T13:39:50.863Z", "dateUpdated": "2024-08-02T22:01:26.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32801
Vulnerability from cvelistv5
Published
2021-09-07 21:40
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/28082 | x_refsource_MISC | |
https://hackerone.com/reports/1251776 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.12 Version: >= 21.0.0, < 21.0.4 Version: >= 22.0.0, < 22.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:56.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28082" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1251776" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.12" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.4" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:06:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28082" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1251776" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-mcpf-v65v-359h", "discovery": "UNKNOWN" }, "title": "Exceptions may have logged Encryption-at-Rest key content in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32801", "STATE": "PUBLIC", "TITLE": "Exceptions may have logged Encryption-at-Rest key content in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.12" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.4" }, { "version_value": "\u003e= 22.0.0, \u003c 22.1.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532: Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h" }, { "name": "https://github.com/nextcloud/server/pull/28082", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28082" }, { "name": "https://hackerone.com/reports/1251776", "refsource": "MISC", "url": "https://hackerone.com/reports/1251776" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-mcpf-v65v-359h", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32801", "datePublished": "2021-09-07T21:40:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:56.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37629
Vulnerability from cvelistv5
Published
2021-09-07 20:25
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users unable to upgrade it is recommended that the Richdocuments application be disabled.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/1663 | x_refsource_MISC | |
https://hackerone.com/reports/1258750 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.8.4 Version: >= 4.0.0, < 4.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/1663" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1258750" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.8.4" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users unable to upgrade it is recommended that the Richdocuments application be disabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-07T20:25:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/1663" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1258750" } ], "source": { "advisory": "GHSA-gvvr-h36p-8mjx", "discovery": "UNKNOWN" }, "title": "Lack of ratelimit on Richdocuments OCS endpoint in nextcloud", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37629", "STATE": "PUBLIC", "TITLE": "Lack of ratelimit on Richdocuments OCS endpoint in nextcloud" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.8.4" }, { "version_value": "\u003e= 4.0.0, \u003c 4.2.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users unable to upgrade it is recommended that the Richdocuments application be disabled." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx" }, { "name": "https://github.com/nextcloud/richdocuments/pull/1663", "refsource": "MISC", "url": "https://github.com/nextcloud/richdocuments/pull/1663" }, { "name": "https://hackerone.com/reports/1258750", "refsource": "MISC", "url": "https://hackerone.com/reports/1258750" } ] }, "source": { "advisory": "GHSA-gvvr-h36p-8mjx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37629", "datePublished": "2021-09-07T20:25:11", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39954
Vulnerability from cvelistv5
Published
2023-08-10 14:32
Modified
2024-10-03 15:08
Severity ?
EPSS score ?
Summary
user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, an attacker that obtained at least read access to a snapshot of the database can impersonate the Nextcloud server towards linked servers. user_oidc 1.3.3 contains a patch. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/pull/636 | x_refsource_MISC | |
https://hackerone.com/reports/1994328 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.0.0, < 1.3.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq" }, { "name": "https://github.com/nextcloud/user_oidc/pull/636", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/636" }, { "name": "https://hackerone.com/reports/1994328", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1994328" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39954", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:00:38.350562Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:08:09.372Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.0.0, \u003c 1.3.3" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, an attacker that obtained at least read access to a snapshot of the database can impersonate the Nextcloud server towards linked servers. user_oidc 1.3.3 contains a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-311", "description": "CWE-311: Missing Encryption of Sensitive Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T14:32:27.032Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq" }, { "name": "https://github.com/nextcloud/user_oidc/pull/636", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/pull/636" }, { "name": "https://hackerone.com/reports/1994328", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1994328" } ], "source": { "advisory": "GHSA-3f92-5c8p-f6gq", "discovery": "UNKNOWN" }, "title": "user_oidc app stores client secret unencrypted in database" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39954", "datePublished": "2023-08-10T14:32:27.032Z", "dateReserved": "2023-08-07T16:27:27.075Z", "dateUpdated": "2024-10-03T15:08:09.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52515
Vulnerability from cvelistv5
Published
2024-11-15 17:03
Modified
2024-11-15 17:32
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5m5g-hw8c-2236 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/45340 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/7e1c30f82a63fbea8c269e0eec38291377f32604 | x_refsource_MISC | |
https://hackerone.com/reports/2484499 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 29.0.0, < 29.0.1 Version: >= 28.0.0, < 28.0.6 Version: >= 27.0.0, < 27.1.10 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52515", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:32:28.374271Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:32:49.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.1" }, { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-706", "description": "CWE-706: Use of Incorrectly-Resolved Name or Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:03:09.033Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5m5g-hw8c-2236", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5m5g-hw8c-2236" }, { "name": "https://github.com/nextcloud/server/pull/45340", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/45340" }, { "name": "https://github.com/nextcloud/server/commit/7e1c30f82a63fbea8c269e0eec38291377f32604", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/7e1c30f82a63fbea8c269e0eec38291377f32604" }, { "name": "https://hackerone.com/reports/2484499", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2484499" } ], "source": { "advisory": "GHSA-5m5g-hw8c-2236", "discovery": "UNKNOWN" }, "title": "Nextcloud Server has incomplete sanitization of SVG files allows to embed other images into previews" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52515", "datePublished": "2024-11-15T17:03:09.033Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T17:32:49.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26482
Vulnerability from cvelistv5
Published
2023-03-30 18:27
Modified
2024-08-02 11:53
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud implementation. In affected versions a missing scope validation allowed users to create workflows which are designed to be only available for administrators. Some workflows are designed to be RCE by invoking defined scripts, in order to generate PDFs, invoking webhooks or running scripts on the server. Due to this combination depending on the available apps the issue can result in a RCE at the end. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should disable app `workflow_scripts` and `workflow_pdf_converter` as a mitigation.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 24.0.10 Version: >= 25.0.0, < 25.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj" }, { "name": "https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 24.0.10" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud implementation. In affected versions a missing scope validation allowed users to create workflows which are designed to be only available for administrators. Some workflows are designed to be RCE by invoking defined scripts, in order to generate PDFs, invoking webhooks or running scripts on the server. Due to this combination depending on the available apps the issue can result in a RCE at the end. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should disable app `workflow_scripts` and `workflow_pdf_converter` as a mitigation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:27:17.333Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h3c9-cmh8-7qpj" }, { "name": "https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/5a06b50b10cc9278bbe68bbf897a0c4aeb0c4e60" } ], "source": { "advisory": "GHSA-h3c9-cmh8-7qpj", "discovery": "UNKNOWN" }, "title": "Scope of workflow operations is not validated in nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-26482", "datePublished": "2023-03-30T18:27:17.333Z", "dateReserved": "2023-02-23T23:22:58.574Z", "dateUpdated": "2024-08-02T11:53:53.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39338
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
user_oidc is an OpenID Connect user backend for Nextcloud. Versions prior to 1.2.1 did not properly validate discovery urls which may lead to a stored cross site scripting attack vector. The impact is limited due to the restrictive CSP that is applied on this endpoint. Additionally this vulnerability has only been shown to be exploitable in the Safari web browser. This issue has been addressed in version 1.2.1. Users are advised to upgrade. Users unable to upgrade should urge their users to avoid using the Safari web browser.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5fpw-795h-rg57" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/496" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1687410" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc is an OpenID Connect user backend for Nextcloud. Versions prior to 1.2.1 did not properly validate discovery urls which may lead to a stored cross site scripting attack vector. The impact is limited due to the restrictive CSP that is applied on this endpoint. Additionally this vulnerability has only been shown to be exploitable in the Safari web browser. This issue has been addressed in version 1.2.1. Users are advised to upgrade. Users unable to upgrade should urge their users to avoid using the Safari web browser." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5fpw-795h-rg57" }, { "url": "https://github.com/nextcloud/user_oidc/pull/496" }, { "url": "https://hackerone.com/reports/1687410" } ], "source": { "advisory": "GHSA-5fpw-795h-rg57", "discovery": "UNKNOWN" }, "title": "Stored cross site scripting (XSS) vulnerability via Authorization Endpoint in user_oidc" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39338", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39962
Vulnerability from cvelistv5
Published
2023-08-10 17:23
Modified
2024-10-03 19:54
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 19.0.0 and prior to versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. As a workaround, disable app files_external. This also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/39323 | x_refsource_MISC | |
https://hackerone.com/reports/2047168 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 19.0.0, < 19.0.13.10 Version: >= 20.0.0, < 20.0.14.15 Version: >= 21.0.0, < 21.0.9.13 Version: >= 22.0.0, < 22.2.10.14 Version: >= 23.0.0, < 23.0.12.9 Version: >= 24.0.0, < 24.0.12.5 Version: >= 25.0.0, < 25.0.9 Version: >= 26.0.0, < 26.0.4 Version: >= 27.0.0, < 27.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.123Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm" }, { "name": "https://github.com/nextcloud/server/pull/39323", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/39323" }, { "name": "https://hackerone.com/reports/2047168", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2047168" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "server", "vendor": "nextcloud", "versions": [ { "lessThan": "19.0.13.0", "status": "affected", "version": "19.0.0", "versionType": "custom" }, { "lessThan": "20.0.14.15", "status": "affected", "version": "20.0.0", "versionType": "custom" }, { "lessThan": "21.0.9.13", "status": "affected", "version": "21.0.0", "versionType": "custom" }, { "lessThan": "22.2.10.14", "status": "affected", "version": "22.0.0", "versionType": "custom" }, { "lessThan": "23.0.12.9", "status": "affected", "version": "23.0.0", "versionType": "custom" }, { "lessThan": "24.0.12.5", "status": "affected", "version": "24.0.0", "versionType": "custom" }, { "lessThan": "25.0.9", "status": "affected", "version": "25.0.0", "versionType": "custom" }, { "lessThan": "26.0.4", "status": "affected", "version": "26.0.0", "versionType": "custom" }, { "lessThan": "27.0.1", "status": "affected", "version": "27.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39962", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T19:50:52.382458Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T19:54:43.544Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 19.0.0, \u003c 19.0.13.10" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.14.15" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.9.13" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.14" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.9" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.5" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.9" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.4" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 19.0.0 and prior to versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. As a workaround, disable app files_external. This also makes the external storage inaccessible but retains the configurations until a patched version has been deployed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:23:50.261Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwxx-2752-w3xm" }, { "name": "https://github.com/nextcloud/server/pull/39323", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/39323" }, { "name": "https://hackerone.com/reports/2047168", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2047168" } ], "source": { "advisory": "GHSA-xwxx-2752-w3xm", "discovery": "UNKNOWN" }, "title": "Users can delete external storage mount points" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39962", "datePublished": "2023-08-10T17:23:50.261Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-03T19:54:43.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32688
Vulnerability from cvelistv5
Published
2021-07-12 13:45
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/27000 | x_refsource_MISC | |
https://hackerone.com/reports/1193321 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/27000" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1193321" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:09:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/27000" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1193321" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-48m7-7r2r-838r", "discovery": "UNKNOWN" }, "title": "Application specific tokens can change their own scope", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32688", "STATE": "PUBLIC", "TITLE": "Application specific tokens can change their own scope" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285: Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r" }, { "name": "https://github.com/nextcloud/server/pull/27000", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/27000" }, { "name": "https://hackerone.com/reports/1193321", "refsource": "MISC", "url": "https://hackerone.com/reports/1193321" }, { "name": "FEDORA-2021-9b421b78af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-48m7-7r2r-838r", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32688", "datePublished": "2021-07-12T13:45:13", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52513
Vulnerability from cvelistv5
Published
2024-11-15 17:08
Modified
2024-11-15 17:33
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/6485 | x_refsource_MISC | |
https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548 | x_refsource_MISC | |
https://hackerone.com/reports/2376900 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.11 Version: >= 29.0.0, < 29.0.8 Version: >= 30.0.0, < 30.0.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52513", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:33:15.473323Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:33:35.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.11" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.8" }, { "status": "affected", "version": "\u003e= 30.0.0, \u003c 30.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. After receiving a \"Files drop\" or \"Password protected\" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:08:56.019Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj" }, { "name": "https://github.com/nextcloud/text/pull/6485", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/6485" }, { "name": "https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548" }, { "name": "https://hackerone.com/reports/2376900", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2376900" } ], "source": { "advisory": "GHSA-gxph-5m4j-pfmj", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s Attachments folder for Text app is accessible on \"Files drop\" and \"Password protected\" shares" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52513", "datePublished": "2024-11-15T17:08:56.019Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T17:33:35.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41166
Vulnerability from cvelistv5
Published
2022-01-26 22:35
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. An issue in versions prior to 3.17.1 may lead to sensitive information disclosure. An unauthorized app that does not have the otherwise required `MANAGE_DOCUMENTS` permission may view image thumbnails for images it does not have permission to view. Version 3.17.1 contains a patch. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://hackerone.com/reports/1358597 | x_refsource_MISC | |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wrwg-jwpg-r3c4 | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/commit/aa47197109970b8449c4e44601eba36e3481b086 | x_refsource_MISC | |
https://github.com/nextcloud/android/commit/b6ecf515b38c2d82d32743f27236534f3e03ee0c | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.17.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1358597" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wrwg-jwpg-r3c4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/commit/aa47197109970b8449c4e44601eba36e3481b086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/commit/b6ecf515b38c2d82d32743f27236534f3e03ee0c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.17.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. An issue in versions prior to 3.17.1 may lead to sensitive information disclosure. An unauthorized app that does not have the otherwise required `MANAGE_DOCUMENTS` permission may view image thumbnails for images it does not have permission to view. Version 3.17.1 contains a patch. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276: Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-26T22:35:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1358597" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wrwg-jwpg-r3c4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/commit/aa47197109970b8449c4e44601eba36e3481b086" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/commit/b6ecf515b38c2d82d32743f27236534f3e03ee0c" } ], "source": { "advisory": "GHSA-wrwg-jwpg-r3c4", "discovery": "UNKNOWN" }, "title": "Permission bypass in Nextcloud Android App", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41166", "STATE": "PUBLIC", "TITLE": "Permission bypass in Nextcloud Android App" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.17.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. An issue in versions prior to 3.17.1 may lead to sensitive information disclosure. An unauthorized app that does not have the otherwise required `MANAGE_DOCUMENTS` permission may view image thumbnails for images it does not have permission to view. Version 3.17.1 contains a patch. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-276: Incorrect Default Permissions" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1358597", "refsource": "MISC", "url": "https://hackerone.com/reports/1358597" }, { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wrwg-jwpg-r3c4", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wrwg-jwpg-r3c4" }, { "name": "https://github.com/nextcloud/android/commit/aa47197109970b8449c4e44601eba36e3481b086", "refsource": "MISC", "url": "https://github.com/nextcloud/android/commit/aa47197109970b8449c4e44601eba36e3481b086" }, { "name": "https://github.com/nextcloud/android/commit/b6ecf515b38c2d82d32743f27236534f3e03ee0c", "refsource": "MISC", "url": "https://github.com/nextcloud/android/commit/b6ecf515b38c2d82d32743f27236534f3e03ee0c" } ] }, "source": { "advisory": "GHSA-wrwg-jwpg-r3c4", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41166", "datePublished": "2022-01-26T22:35:10", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48303
Vulnerability from cvelistv5
Published
2023-11-21 22:00
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details of user configured external storage. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/39895 | x_refsource_MISC | |
https://hackerone.com/reports/2107934 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.11 Version: >= 26.0.0, < 26.0.6 Version: >= 27.0.0, < 27.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh" }, { "name": "https://github.com/nextcloud/server/pull/39895", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/39895" }, { "name": "https://hackerone.com/reports/2107934", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2107934" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.11" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details of user configured external storage. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T22:00:02.462Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2448-44rp-c7hh" }, { "name": "https://github.com/nextcloud/server/pull/39895", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/39895" }, { "name": "https://hackerone.com/reports/2107934", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2107934" } ], "source": { "advisory": "GHSA-2448-44rp-c7hh", "discovery": "UNKNOWN" }, "title": "Nextcloud Server admins can change authentication details of user configured external storage" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48303", "datePublished": "2023-11-21T22:00:02.462Z", "dateReserved": "2023-11-14T17:41:15.571Z", "dateUpdated": "2024-08-02T21:23:39.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22212
Vulnerability from cvelistv5
Published
2024-01-18 19:04
Modified
2024-09-11 20:31
Severity ?
EPSS score ?
Summary
Nextcloud Global Site Selector is a tool which allows you to run multiple small Nextcloud instances and redirect users to the right server. A problem in the password verification method allows an attacker to authenticate as another user. It is recommended that the Nextcloud Global Site Selector is upgraded to version 1.4.1, 2.1.2, 2.3.4 or 2.4.5. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vj5q-f63m-wp77 | x_refsource_CONFIRM | |
https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee | x_refsource_MISC | |
https://hackerone.com/reports/2248689 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.1.0, < 1.4.1 Version: >= 2.0.0, < 2.1.2 Version: >= 2.2.0, < 2.3.4 Version: >= 2.4.0, < 2.4.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vj5q-f63m-wp77", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vj5q-f63m-wp77" }, { "name": "https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee" }, { "name": "https://hackerone.com/reports/2248689", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2248689" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22212", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T20:31:31.854481Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T20:31:45.952Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.1.0, \u003c 1.4.1" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.1.2" }, { "status": "affected", "version": "\u003e= 2.2.0, \u003c 2.3.4" }, { "status": "affected", "version": "\u003e= 2.4.0, \u003c 2.4.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Global Site Selector is a tool which allows you to run multiple small Nextcloud instances and redirect users to the right server. A problem in the password verification method allows an attacker to authenticate as another user. It is recommended that the Nextcloud Global Site Selector is upgraded to version 1.4.1, 2.1.2, 2.3.4 or 2.4.5. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.7, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T19:04:10.467Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vj5q-f63m-wp77", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vj5q-f63m-wp77" }, { "name": "https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee" }, { "name": "https://hackerone.com/reports/2248689", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2248689" } ], "source": { "advisory": "GHSA-vj5q-f63m-wp77", "discovery": "UNKNOWN" }, "title": "Nextcloud global site selector authentication bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22212", "datePublished": "2024-01-18T19:04:10.467Z", "dateReserved": "2024-01-08T04:59:27.374Z", "dateUpdated": "2024-09-11T20:31:45.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32694
Vulnerability from cvelistv5
Published
2021-06-17 21:15
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h2gm-m374-99vc | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/7919 | x_refsource_MISC | |
https://hackerone.com/reports/859136 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.15.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h2gm-m374-99vc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/7919" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/859136" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.15.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248: Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-17T21:15:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h2gm-m374-99vc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/7919" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/859136" } ], "source": { "advisory": "GHSA-h2gm-m374-99vc", "discovery": "UNKNOWN" }, "title": "Malicious Android application can crash the Nextcloud Android Client", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32694", "STATE": "PUBLIC", "TITLE": "Malicious Android application can crash the Nextcloud Android Client" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.15.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-248: Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h2gm-m374-99vc", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h2gm-m374-99vc" }, { "name": "https://github.com/nextcloud/android/pull/7919", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/7919" }, { "name": "https://hackerone.com/reports/859136", "refsource": "MISC", "url": "https://hackerone.com/reports/859136" } ] }, "source": { "advisory": "GHSA-h2gm-m374-99vc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32694", "datePublished": "2021-06-17T21:15:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37884
Vulnerability from cvelistv5
Published
2024-06-14 15:36
Modified
2024-09-03 16:01
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. A malicious user was able to send delete requests for old versions of files they only got shared with read permissions. It is recommended that the Nextcloud Server is upgraded to 26.0.12 or 27.1.7 or 28.0.3 and that the Nextcloud Enterprise Server is upgraded to 26.0.12 or 27.1.7 or 28.0.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/43727 | x_refsource_MISC | |
https://hackerone.com/reports/2290680 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 26.0.0, < 26.0.13 Version: >= 27.0.0, < 27.1.8 Version: >= 28.0.0, < 28.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:39.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c" }, { "name": "https://github.com/nextcloud/server/pull/43727", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/43727" }, { "name": "https://hackerone.com/reports/2290680", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2290680" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-37884", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T16:00:54.723035Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T16:01:08.371Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.13" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.8" }, { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. A malicious user was able to send delete requests for old versions of files they only got shared with read permissions. It is recommended that the Nextcloud Server is upgraded to 26.0.12 or 27.1.7 or 28.0.3 and that the Nextcloud Enterprise Server is upgraded to 26.0.12 or 27.1.7 or 28.0.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:36:16.181Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c" }, { "name": "https://github.com/nextcloud/server/pull/43727", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/43727" }, { "name": "https://hackerone.com/reports/2290680", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2290680" } ], "source": { "advisory": "GHSA-xwgx-f37p-xh8c", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s users can delete old versions of read-only shared files" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37884", "datePublished": "2024-06-14T15:36:16.181Z", "dateReserved": "2024-06-10T19:54:41.360Z", "dateUpdated": "2024-09-03T16:01:08.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45149
Vulnerability from cvelistv5
Published
2023-10-16 19:03
Modified
2024-09-16 14:40
Severity ?
EPSS score ?
Summary
Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/10545 | x_refsource_MISC | |
https://hackerone.com/reports/2094473 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 15.0.0, < 15.0.8 Version: >= 16.0.0, < 16.0.6 Version: >= 17.0.0, < 17.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.003Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv" }, { "name": "https://github.com/nextcloud/spreed/pull/10545", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/10545" }, { "name": "https://hackerone.com/reports/2094473", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2094473" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45149", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T14:29:14.725109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:40:06.105Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 15.0.0, \u003c 15.0.8" }, { "status": "affected", "version": "\u003e= 16.0.0, \u003c 16.0.6" }, { "status": "affected", "version": "\u003e= 17.0.0, \u003c 17.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T19:03:20.324Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv" }, { "name": "https://github.com/nextcloud/spreed/pull/10545", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/10545" }, { "name": "https://hackerone.com/reports/2094473", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2094473" } ], "source": { "advisory": "GHSA-7rf8-pqmj-rpqv", "discovery": "UNKNOWN" }, "title": "Password of talk conversations can be bruteforced in Nextcloud" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-45149", "datePublished": "2023-10-16T19:03:20.324Z", "dateReserved": "2023-10-04T16:02:46.331Z", "dateUpdated": "2024-09-16T14:40:06.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35927
Vulnerability from cvelistv5
Published
2023-06-23 20:53
Modified
2024-11-07 18:29
Severity ?
EPSS score ?
Summary
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again.
Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38247 | x_refsource_MISC | |
https://hackerone.com/reports/1976754 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: Nextcloud Server >= 25.0.0, < 25.0.7 Version: Nextcloud Server >= 26.0.0, < 26.0.2 Version: Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 Version: Nextcloud Enterprise Server >= 26.0.0, < 26.0.2 Version: Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12 Version: Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12 Version: Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7 Version: Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:40.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87" }, { "name": "https://github.com/nextcloud/server/pull/38247", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38247" }, { "name": "https://hackerone.com/reports/1976754", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1976754" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35927", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T18:29:27.883306Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T18:29:35.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "Nextcloud Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Server \u003e= 26.0.0, \u003c 26.0.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 25.0.0, \u003c 25.0.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 26.0.0, \u003c 26.0.2" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 21.0.0, \u003c 21.0.9.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 22.0.0, \u003c 22.2.10.12" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 23.0.0, \u003c 23.0.12.7" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 24.0.0, \u003c 24.0.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again.\n\nNextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the \"Administration\" \u003e \"Sharing\" settings `\u2026/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T20:53:33.688Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87" }, { "name": "https://github.com/nextcloud/server/pull/38247", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38247" }, { "name": "https://hackerone.com/reports/1976754", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1976754" } ], "source": { "advisory": "GHSA-h7f7-535f-7q87", "discovery": "UNKNOWN" }, "title": "Nextcloud system addressbooks can be modified by malicious trusted server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35927", "datePublished": "2023-06-23T20:53:33.688Z", "dateReserved": "2023-06-20T14:02:45.593Z", "dateUpdated": "2024-11-07T18:29:35.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39332
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/4972" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1707977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p" }, { "url": "https://github.com/nextcloud/desktop/pull/4972" }, { "url": "https://hackerone.com/reports/1707977" } ], "source": { "advisory": "GHSA-q9f6-4r6r-h74p", "discovery": "UNKNOWN" }, "title": "Cross-site scripting (XSS) in Nextcloud Desktop Client " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39332", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48304
Vulnerability from cvelistv5
Published
2023-11-21 22:06
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/40292 | x_refsource_MISC | |
https://hackerone.com/reports/2112973 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.11 Version: >= 26.0.0, < 26.0.6 Version: >= 27.0.0, < 27.1.0 Version: >= 22.0.0, < 22.2.10.16 Version: >= 23.0.0, < 23.0.12.11 Version: >= 24.0.0, < 24.0.12.7 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3" }, { "name": "https://github.com/nextcloud/server/pull/40292", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/40292" }, { "name": "https://hackerone.com/reports/2112973", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2112973" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.11" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.0" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.16" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.11" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T22:06:00.484Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3" }, { "name": "https://github.com/nextcloud/server/pull/40292", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/40292" }, { "name": "https://hackerone.com/reports/2112973", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2112973" } ], "source": { "advisory": "GHSA-8jwv-c8c8-9fr3", "discovery": "UNKNOWN" }, "title": "Nextcloud Server vulnerable to attacker enabling/disabling birthday calendar for any user" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48304", "datePublished": "2023-11-21T22:06:00.484Z", "dateReserved": "2023-11-14T17:41:15.571Z", "dateUpdated": "2024-08-02T21:23:39.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32727
Vulnerability from cvelistv5
Published
2021-07-12 20:40
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736 | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/8438 | x_refsource_MISC | |
https://hackerone.com/reports/1189162 | x_refsource_MISC | |
https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.16.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/8438" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1189162" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.16.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T20:40:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/8438" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1189162" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices" } ], "source": { "advisory": "GHSA-5v33-r9cm-7736", "discovery": "UNKNOWN" }, "title": "End-to-end encryption device setup did not verify public key", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32727", "STATE": "PUBLIC", "TITLE": "End-to-end encryption device setup did not verify public key" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.16.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736" }, { "name": "https://github.com/nextcloud/android/pull/8438", "refsource": "MISC", "url": "https://github.com/nextcloud/android/pull/8438" }, { "name": "https://hackerone.com/reports/1189162", "refsource": "MISC", "url": "https://hackerone.com/reports/1189162" }, { "name": "https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices", "refsource": "MISC", "url": "https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices" } ] }, "source": { "advisory": "GHSA-5v33-r9cm-7736", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32727", "datePublished": "2021-07-12T20:40:13", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32653
Vulnerability from cvelistv5
Published
2021-06-01 19:50
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server versions prior to 19.0.11, 20.0.10, or 21.0.2 send user IDs to the lookup server even if the user has no fields set to published. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2; no workarounds outside the updates are known to exist.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-396j-vqpr-qg45 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1173436 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.11 Version: >= 20.0.0, < 20.0.10 Version: >= 21.0.0, < 21.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:30.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-396j-vqpr-qg45" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1173436" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.11" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.10" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server versions prior to 19.0.11, 20.0.10, or 21.0.2 send user IDs to the lookup server even if the user has no fields set to published. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2; no workarounds outside the updates are known to exist." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201: Insertion of Sensitive Information Into Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:10:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-396j-vqpr-qg45" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1173436" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-396j-vqpr-qg45", "discovery": "UNKNOWN" }, "title": "Default settings leak federated cloud ID to lookup server of all users", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32653", "STATE": "PUBLIC", "TITLE": "Default settings leak federated cloud ID to lookup server of all users" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.11" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.10" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server versions prior to 19.0.11, 20.0.10, or 21.0.2 send user IDs to the lookup server even if the user has no fields set to published. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2; no workarounds outside the updates are known to exist." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-201: Insertion of Sensitive Information Into Sent Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-396j-vqpr-qg45", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-396j-vqpr-qg45" }, { "name": "https://hackerone.com/reports/1173436", "refsource": "MISC", "url": "https://hackerone.com/reports/1173436" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-396j-vqpr-qg45", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32653", "datePublished": "2021-06-01T19:50:09", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:30.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32748
Vulnerability from cvelistv5
Published
2021-07-27 21:10
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Richdocuments in an open source self hosted online office. Nextcloud uses the WOPI ("Web Application Open Platform Interface") protocol to communicate with the Collabora Editor, the communication between these two services was not protected by a credentials or IP check. Whilst this does not result in gaining access to data that the user has not yet access to, it can result in a bypass of any enforced watermark on documents as described on the [Nextcloud Virtual Data Room](https://nextcloud.com/virtual-data-room/) website and [our documentation](https://portal.nextcloud.com/article/nextcloud-and-virtual-data-room-configuration-59.html). The Nextcloud Richdocuments releases 3.8.3 and 4.2.0 add an additional admin settings for an allowlist of IP addresses that can access the WOPI API. We recommend upgrading and configuring the allowlist to a list of Collabora servers. There is no known workaround. Note that this primarily results a bypass of any configured watermark or download protection using File Access Control. If you do not require or rely on these as a security feature no immediate action is required on your end.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24x8-h6m2-9jf2 | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/1640 | x_refsource_MISC | |
https://hackerone.com/reports/1194606 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.8.3 Version: >= 4.0.0, < 4.2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24x8-h6m2-9jf2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/1640" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1194606" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.8.3" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Richdocuments in an open source self hosted online office. Nextcloud uses the WOPI (\"Web Application Open Platform Interface\") protocol to communicate with the Collabora Editor, the communication between these two services was not protected by a credentials or IP check. Whilst this does not result in gaining access to data that the user has not yet access to, it can result in a bypass of any enforced watermark on documents as described on the [Nextcloud Virtual Data Room](https://nextcloud.com/virtual-data-room/) website and [our documentation](https://portal.nextcloud.com/article/nextcloud-and-virtual-data-room-configuration-59.html). The Nextcloud Richdocuments releases 3.8.3 and 4.2.0 add an additional admin settings for an allowlist of IP addresses that can access the WOPI API. We recommend upgrading and configuring the allowlist to a list of Collabora servers. There is no known workaround. Note that this primarily results a bypass of any configured watermark or download protection using File Access Control. If you do not require or rely on these as a security feature no immediate action is required on your end." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-27T21:10:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24x8-h6m2-9jf2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/1640" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1194606" } ], "source": { "advisory": "GHSA-24x8-h6m2-9jf2", "discovery": "UNKNOWN" }, "title": "WOPI API not protected by credentials/IP check", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32748", "STATE": "PUBLIC", "TITLE": "WOPI API not protected by credentials/IP check" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.8.3" }, { "version_value": "\u003e= 4.0.0, \u003c 4.2.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Richdocuments in an open source self hosted online office. Nextcloud uses the WOPI (\"Web Application Open Platform Interface\") protocol to communicate with the Collabora Editor, the communication between these two services was not protected by a credentials or IP check. Whilst this does not result in gaining access to data that the user has not yet access to, it can result in a bypass of any enforced watermark on documents as described on the [Nextcloud Virtual Data Room](https://nextcloud.com/virtual-data-room/) website and [our documentation](https://portal.nextcloud.com/article/nextcloud-and-virtual-data-room-configuration-59.html). The Nextcloud Richdocuments releases 3.8.3 and 4.2.0 add an additional admin settings for an allowlist of IP addresses that can access the WOPI API. We recommend upgrading and configuring the allowlist to a list of Collabora servers. There is no known workaround. Note that this primarily results a bypass of any configured watermark or download protection using File Access Control. If you do not require or rely on these as a security feature no immediate action is required on your end." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862: Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24x8-h6m2-9jf2", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24x8-h6m2-9jf2" }, { "name": "https://github.com/nextcloud/richdocuments/pull/1640", "refsource": "MISC", "url": "https://github.com/nextcloud/richdocuments/pull/1640" }, { "name": "https://hackerone.com/reports/1194606", "refsource": "MISC", "url": "https://hackerone.com/reports/1194606" } ] }, "source": { "advisory": "GHSA-24x8-h6m2-9jf2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32748", "datePublished": "2021-07-27T21:10:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52514
Vulnerability from cvelistv5
Published
2024-11-15 17:06
Modified
2024-11-15 17:33
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g8pr-g25r-58xj | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/44889 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/5fffbcfe8650eab75b00e8d188fbc95b0e43f3a8 | x_refsource_MISC | |
https://hackerone.com/reports/2447316 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.5 Version: >= 27.0.0, < 27.1.9 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52514", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:32:51.437757Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:33:13.755Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.5" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:06:03.628Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g8pr-g25r-58xj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g8pr-g25r-58xj" }, { "name": "https://github.com/nextcloud/server/pull/44889", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/44889" }, { "name": "https://github.com/nextcloud/server/commit/5fffbcfe8650eab75b00e8d188fbc95b0e43f3a8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/5fffbcfe8650eab75b00e8d188fbc95b0e43f3a8" }, { "name": "https://hackerone.com/reports/2447316", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2447316" } ], "source": { "advisory": "GHSA-g8pr-g25r-58xj", "discovery": "UNKNOWN" }, "title": "Nextcloud Server allows users to copy folder that contain files that are blocked by the files access control" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52514", "datePublished": "2024-11-15T17:06:03.628Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T17:33:13.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52519
Vulnerability from cvelistv5
Published
2024-11-15 16:43
Modified
2024-11-15 16:58
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/47635 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/09b8aea8f6783514bffe00df6abbf9fa542faac5 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.10 Version: >= 29.0.0, < 29.0.7 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52519", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:58:03.647312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:58:55.845Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.10" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922: Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:43:57.246Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2" }, { "name": "https://github.com/nextcloud/server/pull/47635", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/47635" }, { "name": "https://github.com/nextcloud/server/commit/09b8aea8f6783514bffe00df6abbf9fa542faac5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/09b8aea8f6783514bffe00df6abbf9fa542faac5" } ], "source": { "advisory": "GHSA-fvpc-8hq6-jgq2", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s OAuth2 client secrets were stored in a recoverable way" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52519", "datePublished": "2024-11-15T16:43:57.246Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T16:58:55.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37886
Vulnerability from cvelistv5
Published
2024-06-14 15:45
Modified
2024-08-02 03:57
Severity ?
EPSS score ?
Summary
user_oidc app is an OpenID Connect user backend for Nextcloud. An attacker could potentially trick the app into accepting a request that is not signed by the correct server. It is recommended that the Nextcloud user_oidc app is upgraded to 1.3.5, 2.0.0, 3.0.0, 4.0.0 or 5.0.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw5h-29xf-g55g | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/pull/715 | x_refsource_MISC | |
https://hackerone.com/reports/1878391 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.3.5 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37886", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-15T20:26:07.568535Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-15T20:30:30.682Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:40.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw5h-29xf-g55g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw5h-29xf-g55g" }, { "name": "https://github.com/nextcloud/user_oidc/pull/715", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/715" }, { "name": "https://hackerone.com/reports/1878391", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1878391" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.3.5" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc app is an OpenID Connect user backend for Nextcloud. An attacker could potentially trick the app into accepting a request that is not signed by the correct server. It is recommended that the Nextcloud user_oidc app is upgraded to 1.3.5, 2.0.0, 3.0.0, 4.0.0 or 5.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347: Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:45:12.913Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw5h-29xf-g55g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw5h-29xf-g55g" }, { "name": "https://github.com/nextcloud/user_oidc/pull/715", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/pull/715" }, { "name": "https://hackerone.com/reports/1878391", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1878391" } ], "source": { "advisory": "GHSA-vw5h-29xf-g55g", "discovery": "UNKNOWN" }, "title": "Nextcloud user_oidc\u0027s ID4me does not validate signature or expiration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37886", "datePublished": "2024-06-14T15:45:12.913Z", "dateReserved": "2024-06-10T19:54:41.360Z", "dateUpdated": "2024-08-02T03:57:40.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37887
Vulnerability from cvelistv5
Published
2024-06-14 15:48
Modified
2024-08-02 03:57
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. Private shared calendar events' recurrence exceptions can be read by sharees. It is recommended that the Nextcloud Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1 and that the Nextcloud Enterprise Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/45309 | x_refsource_MISC | |
https://hackerone.com/reports/2479325 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 27.0.0, < 27.1.10 Version: >= 27.0.0, < 28.0.6 Version: >= 27.0.0, < 29.0.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37887", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T16:56:35.878511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T16:56:43.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:40.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595" }, { "name": "https://github.com/nextcloud/server/pull/45309", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/45309" }, { "name": "https://hackerone.com/reports/2479325", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2479325" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.10" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 28.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 29.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. Private shared calendar events\u0027 recurrence exceptions can be read by sharees. It is recommended that the Nextcloud Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1 and that the Nextcloud Enterprise Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:48:11.867Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595" }, { "name": "https://github.com/nextcloud/server/pull/45309", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/45309" }, { "name": "https://hackerone.com/reports/2479325", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2479325" } ], "source": { "advisory": "GHSA-h4xv-cjpm-j595", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s events information leaked with shared calendars on recurrence exceptions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37887", "datePublished": "2024-06-14T15:48:11.867Z", "dateReserved": "2024-06-10T19:54:41.360Z", "dateUpdated": "2024-08-02T03:57:40.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28835
Vulnerability from cvelistv5
Published
2023-03-30 18:57
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud implementation. In affected versions the generated fallback password when creating a share was using a weak complexity random number generator, so when the sharer did not change it the password could be guessable to an attacker willing to brute force it. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. This issue only affects users who do not have a password policy enabled, so enabling a password policy is an effective mitigation for users unable to upgrade.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w2p-rp9m-9xp9 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/36093 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 24.0.10 Version: >= 25.0.0, < 25.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w2p-rp9m-9xp9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w2p-rp9m-9xp9" }, { "name": "https://github.com/nextcloud/server/pull/36093", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36093" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 24.0.10" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud implementation. In affected versions the generated fallback password when creating a share was using a weak complexity random number generator, so when the sharer did not change it the password could be guessable to an attacker willing to brute force it. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. This issue only affects users who do not have a password policy enabled, so enabling a password policy is an effective mitigation for users unable to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-338", "description": "CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:57:00.487Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w2p-rp9m-9xp9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w2p-rp9m-9xp9" }, { "name": "https://github.com/nextcloud/server/pull/36093", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36093" } ], "source": { "advisory": "GHSA-7w2p-rp9m-9xp9", "discovery": "UNKNOWN" }, "title": "Insecure randomness for default password in nextcloud" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28835", "datePublished": "2023-03-30T18:57:00.487Z", "dateReserved": "2023-03-24T16:25:34.465Z", "dateUpdated": "2024-08-02T13:51:38.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52512
Vulnerability from cvelistv5
Published
2024-11-15 17:18
Modified
2024-11-15 18:24
Severity ?
EPSS score ?
Summary
user_oidc app is an OpenID Connect user backend for Nextcloud. A malicious user could send a malformed login link that would redirect the user to a provided URL after successfully authenticating. It is recommended that the Nextcloud User OIDC app is upgraded to 6.1.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-784j-x2g5-4g7q | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/pull/961 | x_refsource_MISC | |
https://github.com/nextcloud/user_oidc/commit/c923428d51972f6d04636c6accbecdec0c1b88e9 | x_refsource_MISC | |
https://hackerone.com/reports/2720030 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 6.0.0, < 6.1.0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52512", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:24:20.188926Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:24:27.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc app is an OpenID Connect user backend for Nextcloud. A malicious user could send a malformed login link that would redirect the user to a provided URL after successfully authenticating. It is recommended that the Nextcloud User OIDC app is upgraded to 6.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:18:50.519Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-784j-x2g5-4g7q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-784j-x2g5-4g7q" }, { "name": "https://github.com/nextcloud/user_oidc/pull/961", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/pull/961" }, { "name": "https://github.com/nextcloud/user_oidc/commit/c923428d51972f6d04636c6accbecdec0c1b88e9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/commit/c923428d51972f6d04636c6accbecdec0c1b88e9" }, { "name": "https://hackerone.com/reports/2720030", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2720030" } ], "source": { "advisory": "GHSA-784j-x2g5-4g7q", "discovery": "UNKNOWN" }, "title": "Nextcloud User OIDC has an open redirection when logging in with User OIDC" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52512", "datePublished": "2024-11-15T17:18:50.519Z", "dateReserved": "2024-11-11T18:49:23.558Z", "dateUpdated": "2024-11-15T18:24:27.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39329
Vulnerability from cvelistv5
Published
2022-10-27 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 23.0.9 and 24.0.5 are vulnerable to exposure of information that cannot be controlled by administrators without direct database access. Versions 23.0.9 and 24.0.5 contains patches for this issue. No known workarounds are available.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.9 Version: >= 24.0.0, < 24.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f3p-rcm5-mrg3" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/33643" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1675014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.9" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 23.0.9 and 24.0.5 are vulnerable to exposure of information that cannot be controlled by administrators without direct database access. Versions 23.0.9 and 24.0.5 contains patches for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-27T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f3p-rcm5-mrg3" }, { "url": "https://github.com/nextcloud/server/pull/33643" }, { "url": "https://hackerone.com/reports/1675014" } ], "source": { "advisory": "GHSA-8f3p-rcm5-mrg3", "discovery": "UNKNOWN" }, "title": "Profile of disabled user stays accessible" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39329", "datePublished": "2022-10-27T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.110Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32689
Vulnerability from cvelistv5
Published
2021-07-12 18:45
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a fully on-premises audio/video and chat communication service. In versions prior to 11.2.2, if a user was able to reuse an earlier used username, they could get access to any chat message sent to the previous user with this username. The issue was patched in versions 11.2.2 and 11.3.0. As a workaround, don't allow users to choose usernames themselves. This is the default behaviour of Nextcloud, but some user providers may allow doing so.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/5633 | x_refsource_MISC | |
https://hackerone.com/reports/1200700 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/releases/tag/v11.2.2 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/releases/tag/v11.3.0 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 11.2.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/5633" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1200700" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/releases/tag/v11.2.2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/releases/tag/v11.3.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 11.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a fully on-premises audio/video and chat communication service. In versions prior to 11.2.2, if a user was able to reuse an earlier used username, they could get access to any chat message sent to the previous user with this username. The issue was patched in versions 11.2.2 and 11.3.0. As a workaround, don\u0027t allow users to choose usernames themselves. This is the default behaviour of Nextcloud, but some user providers may allow doing so." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-708", "description": "CWE-708: Incorrect Ownership Assignment", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T18:45:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/5633" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1200700" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/releases/tag/v11.2.2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/releases/tag/v11.3.0" } ], "source": { "advisory": "GHSA-xv6f-344w-895c", "discovery": "UNKNOWN" }, "title": "Nextcloud Talk not properly disassociating users from chats after account deletion", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32689", "STATE": "PUBLIC", "TITLE": "Nextcloud Talk not properly disassociating users from chats after account deletion" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 11.2.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Talk is a fully on-premises audio/video and chat communication service. In versions prior to 11.2.2, if a user was able to reuse an earlier used username, they could get access to any chat message sent to the previous user with this username. The issue was patched in versions 11.2.2 and 11.3.0. As a workaround, don\u0027t allow users to choose usernames themselves. This is the default behaviour of Nextcloud, but some user providers may allow doing so." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-708: Incorrect Ownership Assignment" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c" }, { "name": "https://github.com/nextcloud/spreed/pull/5633", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/5633" }, { "name": "https://hackerone.com/reports/1200700", "refsource": "MISC", "url": "https://hackerone.com/reports/1200700" }, { "name": "https://github.com/nextcloud/spreed/releases/tag/v11.2.2", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/releases/tag/v11.2.2" }, { "name": "https://github.com/nextcloud/spreed/releases/tag/v11.3.0", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/releases/tag/v11.3.0" } ] }, "source": { "advisory": "GHSA-xv6f-344w-895c", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32689", "datePublished": "2021-07-12T18:45:15", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52517
Vulnerability from cvelistv5
Published
2024-11-15 16:49
Modified
2024-11-15 17:32
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/48359 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/c45ed55f959ff54f3ea23dd2ae1a5868a075c9fe | x_refsource_MISC | |
https://hackerone.com/reports/2554079 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.11 Version: >= 29.0.0, < 29.0.8 Version: >= 30.0.0, < 30.0.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52517", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:31:43.405552Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:32:03.847Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.11" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.8" }, { "status": "affected", "version": "\u003e= 30.0.0, \u003c 30.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. After storing \"Global credentials\" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:49:40.993Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg" }, { "name": "https://github.com/nextcloud/server/pull/48359", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/48359" }, { "name": "https://github.com/nextcloud/server/commit/c45ed55f959ff54f3ea23dd2ae1a5868a075c9fe", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/c45ed55f959ff54f3ea23dd2ae1a5868a075c9fe" }, { "name": "https://hackerone.com/reports/2554079", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2554079" } ], "source": { "advisory": "GHSA-x9q3-c7f8-3rcg", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s global credentials of external storages are sent back to the frontend" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52517", "datePublished": "2024-11-15T16:49:40.993Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T17:32:03.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32657
Vulnerability from cvelistv5
Published
2021-06-01 22:10
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions of Nextcloud Server prior to 10.0.11, 20.0.10, and 21.0.2, a malicious user may be able to break the user administration page. This would disallow administrators to administrate users on the Nextcloud instance. The vulnerability is fixed in versions 19.0.11, 20.0.10, and 21.0.2. As a workaround, administrators can use the OCC command line tool to administrate the Nextcloud users.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fx62-q47f-f665 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1147611 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.11 Version: >= 20.0.0, < 20.0.10 Version: >= 21.0.0, < 21.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fx62-q47f-f665" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1147611" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.11" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.10" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions of Nextcloud Server prior to 10.0.11, 20.0.10, and 21.0.2, a malicious user may be able to break the user administration page. This would disallow administrators to administrate users on the Nextcloud instance. The vulnerability is fixed in versions 19.0.11, 20.0.10, and 21.0.2. As a workaround, administrators can use the OCC command line tool to administrate the Nextcloud users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:07:31", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fx62-q47f-f665" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1147611" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-fx62-q47f-f665", "discovery": "UNKNOWN" }, "title": "Malicious user could break user administration page", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32657", "STATE": "PUBLIC", "TITLE": "Malicious user could break user administration page" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.11" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.10" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions of Nextcloud Server prior to 10.0.11, 20.0.10, and 21.0.2, a malicious user may be able to break the user administration page. This would disallow administrators to administrate users on the Nextcloud instance. The vulnerability is fixed in versions 19.0.11, 20.0.10, and 21.0.2. As a workaround, administrators can use the OCC command line tool to administrate the Nextcloud users." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fx62-q47f-f665", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fx62-q47f-f665" }, { "name": "https://hackerone.com/reports/1147611", "refsource": "MISC", "url": "https://hackerone.com/reports/1147611" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-fx62-q47f-f665", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32657", "datePublished": "2021-06-01T22:10:10", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24890
Vulnerability from cvelistv5
Published
2022-05-17 19:00
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a video and audio conferencing app for Nextcloud. In versions prior to 13.0.5 and 14.0.0, a call moderator can indirectly enable user webcams by granting permissions, if they were enabled before removing the permissions. A patch is available in versions 13.0.5 and 14.0.0. There are currently no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vxpr-hcqq-7fw7 | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/issues/7048 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/pull/7034 | x_refsource_MISC | |
https://github.com/nextcloud/spreed/pull/7092 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 13.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vxpr-hcqq-7fw7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/issues/7048" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7034" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7092" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 13.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a video and audio conferencing app for Nextcloud. In versions prior to 13.0.5 and 14.0.0, a call moderator can indirectly enable user webcams by granting permissions, if they were enabled before removing the permissions. A patch is available in versions 13.0.5 and 14.0.0. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-17T19:00:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vxpr-hcqq-7fw7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/issues/7048" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7034" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7092" } ], "source": { "advisory": "GHSA-vxpr-hcqq-7fw7", "discovery": "UNKNOWN" }, "title": "Exposure of Private Personal Information to an Unauthorized Actor in Nextcloud Talk", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24890", "STATE": "PUBLIC", "TITLE": "Exposure of Private Personal Information to an Unauthorized Actor in Nextcloud Talk" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 13.0.5" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Talk is a video and audio conferencing app for Nextcloud. In versions prior to 13.0.5 and 14.0.0, a call moderator can indirectly enable user webcams by granting permissions, if they were enabled before removing the permissions. A patch is available in versions 13.0.5 and 14.0.0. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vxpr-hcqq-7fw7", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vxpr-hcqq-7fw7" }, { "name": "https://github.com/nextcloud/spreed/issues/7048", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/issues/7048" }, { "name": "https://github.com/nextcloud/spreed/pull/7034", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7034" }, { "name": "https://github.com/nextcloud/spreed/pull/7092", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7092" } ] }, "source": { "advisory": "GHSA-vxpr-hcqq-7fw7", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24890", "datePublished": "2022-05-17T19:00:15", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31131
Vulnerability from cvelistv5
Published
2022-07-06 17:55
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Nextcloud mail is a Mail app for the Nextcloud home server product. Versions of Nextcloud mail prior to 1.12.2 were found to be missing user account ownership checks when performing tasks related to mail attachments. Attachments may have been exposed to incorrect system users. It is recommended that the Nextcloud Mail app is upgraded to 1.12.2. There are no known workarounds for this issue. ### Workarounds No workaround available ### References * [Pull request](https://github.com/nextcloud/mail/pull/6600) * [HackerOne](https://hackerone.com/reports/1579820) ### For more information If you have any questions or comments about this advisory: * Create a post in [nextcloud/security-advisories](https://github.com/nextcloud/security-advisories/discussions) * Customers: Open a support ticket at [support.nextcloud.com](https://support.nextcloud.com)
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhv7-5mhv-299j | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/6600 | x_refsource_MISC | |
https://github.com/nextcloud/mail/pull/6600/commits/6dd2527be8d4f6788b449c8a8f5577628b990605 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.12.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhv7-5mhv-299j" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/6600" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/6600/commits/6dd2527be8d4f6788b449c8a8f5577628b990605" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud mail is a Mail app for the Nextcloud home server product. Versions of Nextcloud mail prior to 1.12.2 were found to be missing user account ownership checks when performing tasks related to mail attachments. Attachments may have been exposed to incorrect system users. It is recommended that the Nextcloud Mail app is upgraded to 1.12.2. There are no known workarounds for this issue. ### Workarounds No workaround available ### References * [Pull request](https://github.com/nextcloud/mail/pull/6600) * [HackerOne](https://hackerone.com/reports/1579820) ### For more information If you have any questions or comments about this advisory: * Create a post in [nextcloud/security-advisories](https://github.com/nextcloud/security-advisories/discussions) * Customers: Open a support ticket at [support.nextcloud.com](https://support.nextcloud.com)" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T17:55:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhv7-5mhv-299j" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/6600" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/6600/commits/6dd2527be8d4f6788b449c8a8f5577628b990605" } ], "source": { "advisory": "GHSA-xhv7-5mhv-299j", "discovery": "UNKNOWN" }, "title": "Ownership check missing when updating or deleting mail attachments in Nextcloud mail", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31131", "STATE": "PUBLIC", "TITLE": "Ownership check missing when updating or deleting mail attachments in Nextcloud mail" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.12.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud mail is a Mail app for the Nextcloud home server product. Versions of Nextcloud mail prior to 1.12.2 were found to be missing user account ownership checks when performing tasks related to mail attachments. Attachments may have been exposed to incorrect system users. It is recommended that the Nextcloud Mail app is upgraded to 1.12.2. There are no known workarounds for this issue. ### Workarounds No workaround available ### References * [Pull request](https://github.com/nextcloud/mail/pull/6600) * [HackerOne](https://hackerone.com/reports/1579820) ### For more information If you have any questions or comments about this advisory: * Create a post in [nextcloud/security-advisories](https://github.com/nextcloud/security-advisories/discussions) * Customers: Open a support ticket at [support.nextcloud.com](https://support.nextcloud.com)" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhv7-5mhv-299j", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhv7-5mhv-299j" }, { "name": "https://github.com/nextcloud/mail/pull/6600", "refsource": "MISC", "url": "https://github.com/nextcloud/mail/pull/6600" }, { "name": "https://github.com/nextcloud/mail/pull/6600/commits/6dd2527be8d4f6788b449c8a8f5577628b990605", "refsource": "MISC", "url": "https://github.com/nextcloud/mail/pull/6600/commits/6dd2527be8d4f6788b449c8a8f5577628b990605" } ] }, "source": { "advisory": "GHSA-xhv7-5mhv-299j", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31131", "datePublished": "2022-07-06T17:55:14", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39221
Vulnerability from cvelistv5
Published
2021-10-25 19:05
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc | x_refsource_CONFIRM | |
https://github.com/nextcloud/contacts/pull/2407 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 4.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/contacts/pull/2407" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 4.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T19:05:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/contacts/pull/2407" } ], "source": { "advisory": "GHSA-j6cx-mxqf-f9vc", "discovery": "UNKNOWN" }, "title": "XSS in Contacts", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39221", "STATE": "PUBLIC", "TITLE": "XSS in Contacts" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 4.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434: Unrestricted Upload of File with Dangerous Type" } ] }, { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc" }, { "name": "https://github.com/nextcloud/contacts/pull/2407", "refsource": "MISC", "url": "https://github.com/nextcloud/contacts/pull/2407" } ] }, "source": { "advisory": "GHSA-j6cx-mxqf-f9vc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39221", "datePublished": "2021-10-25T19:05:10", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28845
Vulnerability from cvelistv5
Published
2023-03-31 22:13
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud talk is a video & audio conferencing app for Nextcloud. In affected versions the talk app does not properly filter access to a conversations member list. As a result an attacker could use this vulnerability to gain information about the members of a Talk conversation, even if they themselves are not members. It is recommended that the Nextcloud Talk is upgraded to 14.0.9 or 15.0.4. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/8651 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 15.0.0, < 15.0.4 Version: >= 14.0.0, < 14.0.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf" }, { "name": "https://github.com/nextcloud/spreed/pull/8651", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/8651" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 15.0.0, \u003c 15.0.4" }, { "status": "affected", "version": "\u003e= 14.0.0, \u003c 14.0.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud talk is a video \u0026 audio conferencing app for Nextcloud. In affected versions the talk app does not properly filter access to a conversations member list. As a result an attacker could use this vulnerability to gain information about the members of a Talk conversation, even if they themselves are not members. It is recommended that the Nextcloud Talk is upgraded to 14.0.9 or 15.0.4. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T22:13:44.046Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf" }, { "name": "https://github.com/nextcloud/spreed/pull/8651", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/8651" } ], "source": { "advisory": "GHSA-3m6r-479j-4chf", "discovery": "UNKNOWN" }, "title": "Chat room membership disclosed via autocompletion in Nextcloud talk" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28845", "datePublished": "2023-03-31T22:13:44.046Z", "dateReserved": "2023-03-24T16:25:34.466Z", "dateUpdated": "2024-08-02T13:51:38.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48308
Vulnerability from cvelistv5
Published
2023-12-21 23:12
Modified
2024-11-27 15:46
Severity ?
EPSS score ?
Summary
Nextcloud/Cloud is a calendar app for Nextcloud. An attacker can gain access to stacktrace and internal paths of the server when generating an exception while editing a calendar appointment. It is recommended that the Nextcloud Calendar app is upgraded to 4.5.3
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8 | x_refsource_CONFIRM | |
https://github.com/nextcloud/calendar/pull/5553 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.0, < 4.5.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8" }, { "name": "https://github.com/nextcloud/calendar/pull/5553", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/calendar/pull/5553" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48308", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T15:45:51.881721Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T15:46:01.287Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 4.5.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud/Cloud is a calendar app for Nextcloud. An attacker can gain access to stacktrace and internal paths of the server when generating an exception while editing a calendar appointment. It is recommended that the Nextcloud Calendar app is upgraded to 4.5.3\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1258", "description": "CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-21T23:12:45.538Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8" }, { "name": "https://github.com/nextcloud/calendar/pull/5553", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/calendar/pull/5553" } ], "source": { "advisory": "GHSA-fv3c-qvjr-5rv8", "discovery": "UNKNOWN" }, "title": "Calendar app returns full stacktrace when an error happens while editing appointment" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48308", "datePublished": "2023-12-21T23:12:45.538Z", "dateReserved": "2023-11-14T17:41:15.572Z", "dateUpdated": "2024-11-27T15:46:01.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22471
Vulnerability from cvelistv5
Published
2023-01-14 00:34
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. Broken access control allows a user to delete attachments of other users. There are currently no known workarounds. It is recommended that the Nextcloud Deck app is upgraded to 1.6.5 or 1.7.3 or 1.8.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vw5-pfg6-3wm6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/4173 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.60, < 1.6.5 Version: >= 1.7.0, < 1.7.3 Version: >= 1.8.0, < 1.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vw5-pfg6-3wm6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vw5-pfg6-3wm6" }, { "name": "https://github.com/nextcloud/deck/pull/4173", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/4173" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.60, \u003c 1.6.5" }, { "status": "affected", "version": "\u003e= 1.7.0, \u003c 1.7.3" }, { "status": "affected", "version": "\u003e= 1.8.0, \u003c 1.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. Broken access control allows a user to delete attachments of other users. There are currently no known workarounds. It is recommended that the Nextcloud Deck app is upgraded to 1.6.5 or 1.7.3 or 1.8.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-14T00:34:06.722Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vw5-pfg6-3wm6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vw5-pfg6-3wm6" }, { "name": "https://github.com/nextcloud/deck/pull/4173", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/4173" } ], "source": { "advisory": "GHSA-2vw5-pfg6-3wm6", "discovery": "UNKNOWN" }, "title": "Nextcloud Deck vulnerable to authorization bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22471", "datePublished": "2023-01-14T00:34:06.722Z", "dateReserved": "2022-12-29T03:00:40.880Z", "dateUpdated": "2024-08-02T10:13:48.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25162
Vulnerability from cvelistv5
Published
2023-02-13 20:34
Modified
2024-08-02 11:18
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to 24.0.8 and 23.0.12 and Nextcloud Enterprise server prior to 24.0.8 and 23.0.12 are vulnerable to server-side request forgery (SSRF). Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF, which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. Nextcloud Server 24.0.8 and 23.0.2 and Nextcloud Enterprise Server 24.0.8 and 23.0.12 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/34160 | x_refsource_MISC | |
https://hackerone.com/reports/1702864 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.12 Version: >= 24.0.0, < 24.0.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m" }, { "name": "https://github.com/nextcloud/server/pull/34160", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34160" }, { "name": "https://hackerone.com/reports/1702864", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1702864" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.12" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to 24.0.8 and 23.0.12 and Nextcloud Enterprise server prior to 24.0.8 and 23.0.12 are vulnerable to server-side request forgery (SSRF). Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF, which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. Nextcloud Server 24.0.8 and 23.0.2 and Nextcloud Enterprise Server 24.0.8 and 23.0.12 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-13T20:34:29.201Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m" }, { "name": "https://github.com/nextcloud/server/pull/34160", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/34160" }, { "name": "https://hackerone.com/reports/1702864", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1702864" } ], "source": { "advisory": "GHSA-mqrx-grp7-244m", "discovery": "UNKNOWN" }, "title": "Nextcloud Server vulnerable to SSRF via filter bypass due to lax checking on IPs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25162", "datePublished": "2023-02-13T20:34:29.201Z", "dateReserved": "2023-02-03T16:59:18.245Z", "dateUpdated": "2024-08-02T11:18:35.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37885
Vulnerability from cvelistv5
Published
2024-06-14 15:42
Modified
2024-08-02 03:57
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. A code injection in Nextcloud Desktop Client for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment. It is recommended that the Nextcloud Desktop client is upgraded to 3.12.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mf7-v63m-99p7 | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/6378 | x_refsource_MISC | |
https://hackerone.com/reports/2307625 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.12.0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37885", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T22:04:04.734958Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T22:04:41.991Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:39.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mf7-v63m-99p7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mf7-v63m-99p7" }, { "name": "https://github.com/nextcloud/desktop/pull/6378", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/6378" }, { "name": "https://hackerone.com/reports/2307625", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2307625" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.12.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. A code injection in Nextcloud Desktop Client for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment. It is recommended that the Nextcloud Desktop client is upgraded to 3.12.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:42:42.132Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mf7-v63m-99p7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mf7-v63m-99p7" }, { "name": "https://github.com/nextcloud/desktop/pull/6378", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/6378" }, { "name": "https://hackerone.com/reports/2307625", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2307625" } ], "source": { "advisory": "GHSA-4mf7-v63m-99p7", "discovery": "UNKNOWN" }, "title": "Code injection in Nextcloud Desktop Client for macOS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37885", "datePublished": "2024-06-14T15:42:42.132Z", "dateReserved": "2024-06-10T19:54:41.360Z", "dateUpdated": "2024-08-02T03:57:39.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39364
Vulnerability from cvelistv5
Published
2022-10-27 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a SharePoint service. Nextcloud Server versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server versions 22.2.10.5, 23.0.9, and 24.0.5 contain a patch for this issue. As a workaround, set `zend.exception_ignore_args = On` as an option in `php.ini`.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 22.2.10.5 Version: >= 23.0.0, < 23.0.9 Version: >= 24.0.0, < 24.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/sharepoint/issues/141" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/33689" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1652903" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": " \u003c 22.2.10.5" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.9" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a SharePoint service. Nextcloud Server versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server versions 22.2.10.5, 23.0.9, and 24.0.5 contain a patch for this issue. As a workaround, set `zend.exception_ignore_args = On` as an option in `php.ini`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-27T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5" }, { "url": "https://github.com/nextcloud/sharepoint/issues/141" }, { "url": "https://github.com/nextcloud/server/pull/33689" }, { "url": "https://hackerone.com/reports/1652903" } ], "source": { "advisory": "GHSA-qpf5-jj85-36h5", "discovery": "UNKNOWN" }, "title": "Exception logging in Sharepoint app reveals clear-text connection details" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39364", "datePublished": "2022-10-27T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28999
Vulnerability from cvelistv5
Published
2023-04-04 12:51
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source productivity platform. In Nextcloud Desktop client 3.0.0 until 3.8.0, Nextcloud Android app 3.13.0 until 3.25.0, and Nextcloud iOS app 3.0.5 until 4.8.0, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure and add new files. This issue is fixed in Nextcloud Desktop 3.8.0, Nextcloud Android 3.25.0, and Nextcloud iOS 4.8.0. No known workarounds are available.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.0, < 3.8.0 Version: >= 3.13.0, < 3.25.0 Version: >= 3.0.5, < 4.8.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8875-wxww-3rr8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8875-wxww-3rr8" }, { "name": "https://github.com/nextcloud/desktop/pull/5560", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5560" }, { "name": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.8.0" }, { "status": "affected", "version": "\u003e= 3.13.0, \u003c 3.25.0" }, { "status": "affected", "version": "\u003e= 3.0.5, \u003c 4.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source productivity platform. In Nextcloud Desktop client 3.0.0 until 3.8.0, Nextcloud Android app 3.13.0 until 3.25.0, and Nextcloud iOS app 3.0.5 until 4.8.0, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure and add new files.\u200b This issue is fixed in Nextcloud Desktop 3.8.0, Nextcloud Android 3.25.0, and Nextcloud iOS 4.8.0. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-325", "description": "CWE-325: Missing Cryptographic Step", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-04T12:51:08.241Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8875-wxww-3rr8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8875-wxww-3rr8" }, { "name": "https://github.com/nextcloud/desktop/pull/5560", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/5560" }, { "name": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf", "tags": [ "x_refsource_MISC" ], "url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf" } ], "source": { "advisory": "GHSA-8875-wxww-3rr8", "discovery": "UNKNOWN" }, "title": "Nextcloud: Lack of authenticity of metadata keys allows a malicious server to gain access to E2EE folders" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28999", "datePublished": "2023-04-04T12:51:08.241Z", "dateReserved": "2023-03-29T17:39:16.141Z", "dateUpdated": "2024-08-02T13:51:38.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32652
Vulnerability from cvelistv5
Published
2021-06-01 19:05
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Mail is a mail app for the Nextcloud platform. A missing permission check in Nextcloud Mail before 1.4.3 and 1.8.2 allows another authenticated users to access mail metadata of other users. Versions 1.4.3 and 1.8.2 contain patches for this vulnerability; no workarounds other than the patches are known to exist.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mxx2-6rg9-v2vc | x_refsource_CONFIRM | |
https://hackerone.com/reports/1094063 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.4.3 Version: >= 1.5.5, < 1.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mxx2-6rg9-v2vc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1094063" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.4.3" }, { "status": "affected", "version": "\u003e= 1.5.5, \u003c 1.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is a mail app for the Nextcloud platform. A missing permission check in Nextcloud Mail before 1.4.3 and 1.8.2 allows another authenticated users to access mail metadata of other users. Versions 1.4.3 and 1.8.2 contain patches for this vulnerability; no workarounds other than the patches are known to exist." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-01T19:05:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mxx2-6rg9-v2vc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1094063" } ], "source": { "advisory": "GHSA-mxx2-6rg9-v2vc", "discovery": "UNKNOWN" }, "title": "Missing permission check on email metadata retrieval", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32652", "STATE": "PUBLIC", "TITLE": "Missing permission check on email metadata retrieval" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.4.3" }, { "version_value": "\u003e= 1.5.5, \u003c 1.8.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Mail is a mail app for the Nextcloud platform. A missing permission check in Nextcloud Mail before 1.4.3 and 1.8.2 allows another authenticated users to access mail metadata of other users. Versions 1.4.3 and 1.8.2 contain patches for this vulnerability; no workarounds other than the patches are known to exist." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mxx2-6rg9-v2vc", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mxx2-6rg9-v2vc" }, { "name": "https://hackerone.com/reports/1094063", "refsource": "MISC", "url": "https://hackerone.com/reports/1094063" } ] }, "source": { "advisory": "GHSA-mxx2-6rg9-v2vc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32652", "datePublished": "2021-06-01T19:05:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45660
Vulnerability from cvelistv5
Published
2023-10-16 18:32
Modified
2024-09-13 19:36
Severity ?
EPSS score ?
Summary
Nextcloud mail is an email app for the Nextcloud home server platform. In affected versions a missing check of origin, target and cookies allows for an attacker to abuse the proxy endpoint to denial of service a third server. It is recommended that the Nextcloud Mail is upgraded to 2.2.8 or 3.3.0. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8j9x-fmww-qr37 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/8459 | x_refsource_MISC | |
https://hackerone.com/reports/1895874 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 2.0.0, < 2.2.8 Version: >= 3.0.0, < 3.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8j9x-fmww-qr37", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8j9x-fmww-qr37" }, { "name": "https://github.com/nextcloud/mail/pull/8459", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/8459" }, { "name": "https://hackerone.com/reports/1895874", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1895874" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45660", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-13T19:22:39.279370Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T19:36:36.050Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.8" }, { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud mail is an email app for the Nextcloud home server platform. In affected versions a missing check of origin, target and cookies allows for an attacker to abuse the proxy endpoint to denial of service a third server. It is recommended that the Nextcloud Mail is upgraded to 2.2.8 or 3.3.0. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T18:32:00.486Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8j9x-fmww-qr37", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8j9x-fmww-qr37" }, { "name": "https://github.com/nextcloud/mail/pull/8459", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/8459" }, { "name": "https://hackerone.com/reports/1895874", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1895874" } ], "source": { "advisory": "GHSA-8j9x-fmww-qr37", "discovery": "UNKNOWN" }, "title": "Require strict cookies for image proxy requests in Nextcloud Mail" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-45660", "datePublished": "2023-10-16T18:32:00.486Z", "dateReserved": "2023-10-10T14:36:40.859Z", "dateUpdated": "2024-09-13T19:36:36.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52516
Vulnerability from cvelistv5
Published
2024-11-15 16:55
Modified
2024-11-15 17:32
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/47180 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.9 Version: >= 29.0.0, < 29.0.5 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:32:06.000476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:32:26.732Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.9" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:55:18.934Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm" }, { "name": "https://github.com/nextcloud/server/pull/47180", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/47180" }, { "name": "https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34" } ], "source": { "advisory": "GHSA-35gc-jc6x-29cm", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s shares are not removed when user is limited to share with in their groups and being removed from one of them" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52516", "datePublished": "2024-11-15T16:55:18.934Z", "dateReserved": "2024-11-11T18:49:23.559Z", "dateUpdated": "2024-11-15T17:32:26.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29000
Vulnerability from cvelistv5
Published
2023-04-04 12:53
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534 | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/4949 | x_refsource_MISC | |
https://hackerone.com/reports/1679267 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.0, < 3.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534" }, { "name": "https://github.com/nextcloud/desktop/pull/4949", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/4949" }, { "name": "https://hackerone.com/reports/1679267", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1679267" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-04T12:53:35.904Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534" }, { "name": "https://github.com/nextcloud/desktop/pull/4949", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/4949" }, { "name": "https://hackerone.com/reports/1679267", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1679267" } ], "source": { "advisory": "GHSA-h82x-98q3-7534", "discovery": "UNKNOWN" }, "title": "Nextcloud Desktop client does not verify received singed certificate in end-to-end encryption" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-29000", "datePublished": "2023-04-04T12:53:35.904Z", "dateReserved": "2023-03-29T17:39:16.142Z", "dateUpdated": "2024-08-02T13:51:38.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32656
Vulnerability from cvelistv5
Published
2021-06-01 21:45
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. A vulnerability in federated share exists in versions prior to 19.0.11, 20.0.10, and 21.0.2. An attacker can gain access to basic information about users of a server by accessing a public link that a legitimate server user added as a federated share. This happens because Nextcloud supports sharing registered users with other Nextcloud servers, which can be done automatically when selecting the "Add server automatically once a federated share was created successfully" setting. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2 As a workaround, disable "Add server automatically once a federated share was created successfully" in the Nextcloud settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j875-vr2q-h6x6 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1167853 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.11 Version: >= 20.0.0, < 20.0.10 Version: >= 21.0.0, < 21.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j875-vr2q-h6x6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1167853" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.11" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.10" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. A vulnerability in federated share exists in versions prior to 19.0.11, 20.0.10, and 21.0.2. An attacker can gain access to basic information about users of a server by accessing a public link that a legitimate server user added as a federated share. This happens because Nextcloud supports sharing registered users with other Nextcloud servers, which can be done automatically when selecting the \"Add server automatically once a federated share was created successfully\" setting. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2 As a workaround, disable \"Add server automatically once a federated share was created successfully\" in the Nextcloud settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:10:04", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j875-vr2q-h6x6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1167853" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-j875-vr2q-h6x6", "discovery": "UNKNOWN" }, "title": "Trusted servers exchange can be triggered by attacker", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32656", "STATE": "PUBLIC", "TITLE": "Trusted servers exchange can be triggered by attacker" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.11" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.10" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. A vulnerability in federated share exists in versions prior to 19.0.11, 20.0.10, and 21.0.2. An attacker can gain access to basic information about users of a server by accessing a public link that a legitimate server user added as a federated share. This happens because Nextcloud supports sharing registered users with other Nextcloud servers, which can be done automatically when selecting the \"Add server automatically once a federated share was created successfully\" setting. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2 As a workaround, disable \"Add server automatically once a federated share was created successfully\" in the Nextcloud settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284: Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j875-vr2q-h6x6", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j875-vr2q-h6x6" }, { "name": "https://hackerone.com/reports/1167853", "refsource": "MISC", "url": "https://hackerone.com/reports/1167853" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-j875-vr2q-h6x6", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32656", "datePublished": "2021-06-01T21:45:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32728
Vulnerability from cvelistv5
Published
2021-08-18 16:00
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://hackerone.com/reports/1189162 | x_refsource_MISC | |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5 | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/3338 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4974 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1189162" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/3338" }, { "name": "DSA-4974", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4974" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-19T23:06:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1189162" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/3338" }, { "name": "DSA-4974", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4974" } ], "source": { "advisory": "GHSA-f5fr-5gcv-6cc5", "discovery": "UNKNOWN" }, "title": "End-to-end encryption device setup did not verify public key", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32728", "STATE": "PUBLIC", "TITLE": "End-to-end encryption device setup did not verify public key" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.3.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://hackerone.com/reports/1189162", "refsource": "MISC", "url": "https://hackerone.com/reports/1189162" }, { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5" }, { "name": "https://github.com/nextcloud/desktop/pull/3338", "refsource": "MISC", "url": "https://github.com/nextcloud/desktop/pull/3338" }, { "name": "DSA-4974", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4974" } ] }, "source": { "advisory": "GHSA-f5fr-5gcv-6cc5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32728", "datePublished": "2021-08-18T16:00:13", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39331
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application in the notifications. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3xh-q694-6rc5" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/4944" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1668028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application in the notifications. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3xh-q694-6rc5" }, { "url": "https://github.com/nextcloud/desktop/pull/4944" }, { "url": "https://hackerone.com/reports/1668028" } ], "source": { "advisory": "GHSA-c3xh-q694-6rc5", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting (XSS) in Nexcloud Desktop Client" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39331", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.041Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52525
Vulnerability from cvelistv5
Published
2024-11-15 16:30
Modified
2024-11-15 17:10
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/48915 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/d25a0a2896a2a981939cacb8ee0d555feef22b3b | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.12 Version: >= 29.0.0, < 29.0.9 Version: >= 30.0.0, < 30.0.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52525", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:10:28.084272Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:10:50.412Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.12" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.9" }, { "status": "affected", "version": "\u003e= 30.0.0, \u003c 30.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 1.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:30:28.401Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm" }, { "name": "https://github.com/nextcloud/server/pull/48915", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/48915" }, { "name": "https://github.com/nextcloud/server/commit/d25a0a2896a2a981939cacb8ee0d555feef22b3b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/d25a0a2896a2a981939cacb8ee0d555feef22b3b" } ], "source": { "advisory": "GHSA-w7v5-mgxm-v6gm", "discovery": "UNKNOWN" }, "title": "Nextcloud Server User password is available in memory of the PHP process" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52525", "datePublished": "2024-11-15T16:30:28.401Z", "dateReserved": "2024-11-11T18:49:23.561Z", "dateUpdated": "2024-11-15T17:10:50.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33184
Vulnerability from cvelistv5
Published
2023-05-27 04:36
Modified
2024-08-02 15:39
Severity ?
EPSS score ?
Summary
Nextcloud Mail is a mail app in Nextcloud. A blind SSRF attack allowed to send GET requests to services running in the same web server. It is recommended that the Mail app is update to version 3.02, 2.2.5 or 1.15.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gph-9895-w564 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/8275 | x_refsource_MISC | |
https://hackerone.com/reports/1913095 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.15.3 Version: < 2.2.5 Version: < 3.02 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:39:35.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gph-9895-w564", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gph-9895-w564" }, { "name": "https://github.com/nextcloud/mail/pull/8275", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/8275" }, { "name": "https://hackerone.com/reports/1913095", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1913095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.15.3" }, { "status": "affected", "version": "\u003c 2.2.5" }, { "status": "affected", "version": "\u003c 3.02" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Mail is a mail app in Nextcloud. A blind SSRF attack allowed to send GET requests to services running in the same web server. It is recommended that the Mail app is update to version 3.02, 2.2.5 or 1.15.3.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-27T04:36:01.535Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gph-9895-w564", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gph-9895-w564" }, { "name": "https://github.com/nextcloud/mail/pull/8275", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/8275" }, { "name": "https://hackerone.com/reports/1913095", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1913095" } ], "source": { "advisory": "GHSA-8gph-9895-w564", "discovery": "UNKNOWN" }, "title": "Blind SSRF in the Nextcloud Mail app on avatar endpoint" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33184", "datePublished": "2023-05-27T04:36:01.535Z", "dateReserved": "2023-05-17T22:25:50.697Z", "dateUpdated": "2024-08-02T15:39:35.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25818
Vulnerability from cvelistv5
Published
2023-03-27 20:00
Modified
2024-08-02 11:32
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/36489 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.0, < 24.0.10 Version: >= 25.0.0, < 25.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp" }, { "name": "https://github.com/nextcloud/server/pull/36489", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36489" }, { "name": "https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.10" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T20:00:01.019Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp" }, { "name": "https://github.com/nextcloud/server/pull/36489", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36489" }, { "name": "https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36489/commits/704eb3aa6cecc0a646f5cca4290b595f493f9ed3" } ], "source": { "advisory": "GHSA-v243-x6jc-42mp", "discovery": "UNKNOWN" }, "title": "Missing brute force protection on password reset token in Nextcloud Server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25818", "datePublished": "2023-03-27T20:00:01.019Z", "dateReserved": "2023-02-15T16:34:48.773Z", "dateUpdated": "2024-08-02T11:32:12.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22404
Vulnerability from cvelistv5
Published
2024-01-18 20:14
Modified
2024-08-01 22:43
Severity ?
EPSS score ?
Summary
Nextcloud files Zip app is a tool to create zip archives from one or multiple files from within Nextcloud. In affected versions users can download "view-only" files by zipping the complete folder. It is recommended that the Files ZIP app is upgraded to 1.2.1, 1.4.1, or 1.5.0. Users unable to upgrade should disable the file zip app.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vhj3-mch4-67fq | x_refsource_CONFIRM | |
https://github.com/nextcloud/files_zip/commit/43204539d517a13e945b90652718e2a213f46820 | x_refsource_MISC | |
https://hackerone.com/reports/2247457 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.2.0, < 1.2.1 Version: >= 1.3.0, < 1.4.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vhj3-mch4-67fq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vhj3-mch4-67fq" }, { "name": "https://github.com/nextcloud/files_zip/commit/43204539d517a13e945b90652718e2a213f46820", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/files_zip/commit/43204539d517a13e945b90652718e2a213f46820" }, { "name": "https://hackerone.com/reports/2247457", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2247457" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.2.0, \u003c 1.2.1" }, { "status": "affected", "version": "\u003e= 1.3.0, \u003c 1.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud files Zip app is a tool to create zip archives from one or multiple files from within Nextcloud. In affected versions users can download \"view-only\" files by zipping the complete folder. It is recommended that the Files ZIP app is upgraded to 1.2.1, 1.4.1, or 1.5.0. Users unable to upgrade should disable the file zip app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T20:14:27.914Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vhj3-mch4-67fq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vhj3-mch4-67fq" }, { "name": "https://github.com/nextcloud/files_zip/commit/43204539d517a13e945b90652718e2a213f46820", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/files_zip/commit/43204539d517a13e945b90652718e2a213f46820" }, { "name": "https://hackerone.com/reports/2247457", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2247457" } ], "source": { "advisory": "GHSA-vhj3-mch4-67fq", "discovery": "UNKNOWN" }, "title": "Permissions bypass in Nextcloud with the files zip app" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22404", "datePublished": "2024-01-18T20:14:27.914Z", "dateReserved": "2024-01-10T15:09:55.548Z", "dateUpdated": "2024-08-01T22:43:34.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26041
Vulnerability from cvelistv5
Published
2023-02-27 20:16
Modified
2024-08-02 11:39
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a fully on-premises audio/video and chat communication service. When cron jobs were misconfigured and therefore messages are not expired, the API would still return them while they were then hidden by the frontend code. It is recommended that the Nextcloud Talk is upgraded to 15.0.3. There are no workaround available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j53p-r755-v4jf | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/8515 | x_refsource_MISC | |
https://hackerone.com/reports/1784310 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 15.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:39:06.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j53p-r755-v4jf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j53p-r755-v4jf" }, { "name": "https://github.com/nextcloud/spreed/pull/8515", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/8515" }, { "name": "https://hackerone.com/reports/1784310", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1784310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 15.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a fully on-premises audio/video and chat communication service. When cron jobs were misconfigured and therefore messages are not expired, the API would still return them while they were then hidden by the frontend code. It is recommended that the Nextcloud Talk is upgraded to 15.0.3. There are no workaround available.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T20:16:09.191Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j53p-r755-v4jf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j53p-r755-v4jf" }, { "name": "https://github.com/nextcloud/spreed/pull/8515", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/8515" }, { "name": "https://hackerone.com/reports/1784310", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1784310" } ], "source": { "advisory": "GHSA-j53p-r755-v4jf", "discovery": "UNKNOWN" }, "title": "Nextcloud Talk messages can still be seen on conversation after expiring when cron is misconfigured" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-26041", "datePublished": "2023-02-27T20:16:09.191Z", "dateReserved": "2023-02-17T22:44:03.149Z", "dateUpdated": "2024-08-02T11:39:06.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39959
Vulnerability from cvelistv5
Published
2023-08-10 17:07
Modified
2024-10-08 14:11
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38747 | x_refsource_MISC | |
https://hackerone.com/reports/1832126 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.9 Version: >= 26.0.0, < 26.0.4 Version: >= 27.0.0, < 27.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj" }, { "name": "https://github.com/nextcloud/server/pull/38747", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38747" }, { "name": "https://hackerone.com/reports/1832126", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1832126" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39959", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T14:07:20.676683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:11:04.848Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.9" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.4" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:11:48.800Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g97r-8ffm-hfpj" }, { "name": "https://github.com/nextcloud/server/pull/38747", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38747" }, { "name": "https://hackerone.com/reports/1832126", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1832126" } ], "source": { "advisory": "GHSA-g97r-8ffm-hfpj", "discovery": "UNKNOWN" }, "title": "Existence of calendars and address books can be checked by unauthenticated users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39959", "datePublished": "2023-08-10T17:07:42.367Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-08T14:11:04.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37313
Vulnerability from cvelistv5
Published
2024-06-14 14:50
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/44276 | x_refsource_MISC | |
https://hackerone.com/reports/2419776 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 26.0.0, < 26.0.13 Version: >= 27.0.0, < 27.1.8 Version: >= 28.0.0, < 28.0.4 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "server", "vendor": "nextcloud", "versions": [ { "lessThan": "26.0.13", "status": "affected", "version": "26.0.0", "versionType": "custom" }, { "lessThan": "27.1.8", "status": "affected", "version": "27.0.0", "versionType": "custom" }, { "lessThan": "28.0.4", "status": "affected", "version": "28.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37313", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:49:53.416668Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:54:44.089Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:56.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c" }, { "name": "https://github.com/nextcloud/server/pull/44276", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/44276" }, { "name": "https://hackerone.com/reports/2419776", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2419776" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.13" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.8" }, { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T14:50:44.035Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c" }, { "name": "https://github.com/nextcloud/server/pull/44276", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/44276" }, { "name": "https://hackerone.com/reports/2419776", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2419776" } ], "source": { "advisory": "GHSA-9v72-9xv5-3p7c", "discovery": "UNKNOWN" }, "title": "Nextcloud server allows the by-pass the second factor" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37313", "datePublished": "2024-06-14T14:50:44.035Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:56.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32654
Vulnerability from cvelistv5
Published
2021-06-01 20:45
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to receive write/read privileges on any Federated File Share. Since public links can be added as federated file share, this can also be exploited on any public link. Users can upgrade to patched versions (19.0.11, 20.0.10 or 21.0.2) or, as a workaround, disable federated file sharing.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5 | x_refsource_CONFIRM | |
https://hackerone.com/reports/1170024 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.11 Version: >= 20.0.0, < 20.0.10 Version: >= 21.0.0, < 21.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:30.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1170024" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.11" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.10" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to receive write/read privileges on any Federated File Share. Since public links can be added as federated file share, this can also be exploited on any public link. Users can upgrade to patched versions (19.0.11, 20.0.10 or 21.0.2) or, as a workaround, disable federated file sharing." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:11:03", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1170024" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-jf9h-v24c-22g5", "discovery": "UNKNOWN" }, "title": "Attacker can obtain write access to any federated share/public link", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32654", "STATE": "PUBLIC", "TITLE": "Attacker can obtain write access to any federated share/public link" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.11" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.10" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to receive write/read privileges on any Federated File Share. Since public links can be added as federated file share, this can also be exploited on any public link. Users can upgrade to patched versions (19.0.11, 20.0.10 or 21.0.2) or, as a workaround, disable federated file sharing." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639: Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5" }, { "name": "https://hackerone.com/reports/1170024", "refsource": "MISC", "url": "https://hackerone.com/reports/1170024" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-jf9h-v24c-22g5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32654", "datePublished": "2021-06-01T20:45:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:30.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32741
Vulnerability from cvelistv5
Published
2021-07-12 22:05
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public share link mount endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/26958 | x_refsource_MISC | |
https://hackerone.com/reports/1192144 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/26958" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1192144" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public share link mount endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799: Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T22:05:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/26958" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1192144" } ], "source": { "advisory": "GHSA-crvj-vmf7-xrvr", "discovery": "UNKNOWN" }, "title": "Lack of ratelimit on public share link mount endpoint", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32741", "STATE": "PUBLIC", "TITLE": "Lack of ratelimit on public share link mount endpoint" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public share link mount endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-799: Improper Control of Interaction Frequency" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr" }, { "name": "https://github.com/nextcloud/server/pull/26958", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/26958" }, { "name": "https://hackerone.com/reports/1192144", "refsource": "MISC", "url": "https://hackerone.com/reports/1192144" } ] }, "source": { "advisory": "GHSA-crvj-vmf7-xrvr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32741", "datePublished": "2021-07-12T22:05:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28833
Vulnerability from cvelistv5
Published
2023-03-30 18:49
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud implementation. In affected versions admins of a server were able to upload a logo or a favicon and to provided a file name which was not restricted and could overwrite files in the appdata directory. Administrators may have access to overwrite these files by other means but this method could be exploited by tricking an admin into uploading a maliciously named file. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should avoid ingesting logo files from untrusted sources.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-ch7f-px7m-hg25 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/36095 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 24.0.10 Version: >= 25.0.0, < 25.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-ch7f-px7m-hg25", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-ch7f-px7m-hg25" }, { "name": "https://github.com/nextcloud/server/pull/36095", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 24.0.10" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud implementation. In affected versions admins of a server were able to upload a logo or a favicon and to provided a file name which was not restricted and could overwrite files in the appdata directory. Administrators may have access to overwrite these files by other means but this method could be exploited by tricking an admin into uploading a maliciously named file. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. Users unable to upgrade should avoid ingesting logo files from untrusted sources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:49:38.823Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-ch7f-px7m-hg25", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-ch7f-px7m-hg25" }, { "name": "https://github.com/nextcloud/server/pull/36095", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36095" } ], "source": { "advisory": "GHSA-ch7f-px7m-hg25", "discovery": "UNKNOWN" }, "title": "Unrestricted filenames for logo or favicon as admin in the theming settings in nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28833", "datePublished": "2023-03-30T18:49:38.823Z", "dateReserved": "2023-03-24T16:25:34.465Z", "dateUpdated": "2024-08-02T13:51:38.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39223
Vulnerability from cvelistv5
Published
2021-10-25 21:35
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93 | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/1760 | x_refsource_MISC | |
https://hackerone.com/reports/1253460 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.8.6, Version: >= 4.0.0, < 4.2.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/1760" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1253460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.8.6," }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T21:35:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/1760" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1253460" } ], "source": { "advisory": "GHSA-rjcc-4cgj-6v93", "discovery": "UNKNOWN" }, "title": "File path disclosure of shared files in Richdocuments application", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39223", "STATE": "PUBLIC", "TITLE": "File path disclosure of shared files in Richdocuments application" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.8.6," }, { "version_value": "\u003e= 4.0.0, \u003c 4.2.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93" }, { "name": "https://github.com/nextcloud/richdocuments/pull/1760", "refsource": "MISC", "url": "https://github.com/nextcloud/richdocuments/pull/1760" }, { "name": "https://hackerone.com/reports/1253460", "refsource": "MISC", "url": "https://hackerone.com/reports/1253460" } ] }, "source": { "advisory": "GHSA-rjcc-4cgj-6v93", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39223", "datePublished": "2021-10-25T21:35:11", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45151
Vulnerability from cvelistv5
Published
2023-10-16 18:41
Modified
2024-09-16 14:57
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38398 | x_refsource_MISC | |
https://hackerone.com/reports/1994324 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.8 Version: >= 26.0.0, < 26.0.3 Version: >= 27.0.0, < 27.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9" }, { "name": "https://github.com/nextcloud/server/pull/38398", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38398" }, { "name": "https://hackerone.com/reports/1994324", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1994324" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45151", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T14:57:28.810714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:57:44.642Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.8" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.3" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T18:41:28.713Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9" }, { "name": "https://github.com/nextcloud/server/pull/38398", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38398" }, { "name": "https://hackerone.com/reports/1994324", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1994324" } ], "source": { "advisory": "GHSA-hhgv-jcg9-p4m9", "discovery": "UNKNOWN" }, "title": "OAuth2 client_secret stored in plain text in the Nextcloud database" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-45151", "datePublished": "2023-10-16T18:41:28.713Z", "dateReserved": "2023-10-04T16:02:46.331Z", "dateUpdated": "2024-09-16T14:57:44.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32800
Vulnerability from cvelistv5
Published
2021-09-07 21:35
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/28078 | x_refsource_MISC | |
https://hackerone.com/reports/1271052 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.12 Version: >= 21.0.0, < 21.0.4 Version: >= 22.0.0, < 22.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:56.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.12" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.4" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:06:38", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-gv5w-8q25-785v", "discovery": "UNKNOWN" }, "title": "Bypass of Two Factor Authentication in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32800", "STATE": "PUBLIC", "TITLE": "Bypass of Two Factor Authentication in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.12" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.4" }, { "version_value": "\u003e= 22.0.0, \u003c 22.1.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "name": "https://github.com/nextcloud/server/pull/28078", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28078" }, { "name": "https://hackerone.com/reports/1271052", "refsource": "MISC", "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-gv5w-8q25-785v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32800", "datePublished": "2021-09-07T21:35:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:56.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48239
Vulnerability from cvelistv5
Published
2023-11-21 21:02
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/41123 | x_refsource_MISC | |
https://hackerone.com/reports/2212627 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.13 Version: >= 26.0.0, < 26.0.8 Version: >= 27.0.0, < 27.1.3 Version: >= 20.0.0, < 20.0.14.16 Version: >= 21.0.0, < 21.0.9.13 Version: >= 22.0.0, < 22.2.10.15 Version: >= 23.0.0, < 23.0.12.12 Version: >= 24.0.0, < 24.0.12.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267" }, { "name": "https://github.com/nextcloud/server/pull/41123", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/41123" }, { "name": "https://hackerone.com/reports/2212627", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2212627" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.13" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.8" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.3" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.14.16" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.9.13" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.15" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.12" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T21:02:35.442Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267" }, { "name": "https://github.com/nextcloud/server/pull/41123", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/41123" }, { "name": "https://hackerone.com/reports/2212627", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2212627" } ], "source": { "advisory": "GHSA-f962-hw26-g267", "discovery": "UNKNOWN" }, "title": "Nextcloud Server users can make external storage mount points inaccessible for other users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48239", "datePublished": "2023-11-21T21:02:35.442Z", "dateReserved": "2023-11-13T13:25:18.482Z", "dateUpdated": "2024-08-02T21:23:39.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36074
Vulnerability from cvelistv5
Published
2022-09-15 22:00
Modified
2024-08-03 09:52
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-f748-g76v | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/32941 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.7 Version: >= 24.0.0, < 24.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:52:00.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-f748-g76v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/32941" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.7" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-15T22:00:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-f748-g76v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/32941" } ], "source": { "advisory": "GHSA-vqgm-f748-g76v", "discovery": "UNKNOWN" }, "title": "Authentication headers exposed on by Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-36074", "STATE": "PUBLIC", "TITLE": "Authentication headers exposed on by Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 23.0.7" }, { "version_value": "\u003e= 24.0.0, \u003c 24.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-f748-g76v", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-f748-g76v" }, { "name": "https://github.com/nextcloud/server/pull/32941", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/32941" } ] }, "source": { "advisory": "GHSA-vqgm-f748-g76v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36074", "datePublished": "2022-09-15T22:00:15", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:52:00.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28647
Vulnerability from cvelistv5
Published
2023-03-30 18:12
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/ios/pull/2344 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 4.7.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6" }, { "name": "https://github.com/nextcloud/ios/pull/2344", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/ios/pull/2344" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 4.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:12:25.312Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6" }, { "name": "https://github.com/nextcloud/ios/pull/2344", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/ios/pull/2344" } ], "source": { "advisory": "GHSA-wjgg-2v4p-2gq6", "discovery": "UNKNOWN" }, "title": "App pin of the iOS app can be bypassed in Nextcloud iOS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28647", "datePublished": "2023-03-30T18:12:25.312Z", "dateReserved": "2023-03-20T12:19:47.209Z", "dateUpdated": "2024-08-02T13:43:23.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32318
Vulnerability from cvelistv5
Published
2023-05-26 17:21
Modified
2024-08-02 15:10
Severity ?
EPSS score ?
Summary
Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38 | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/3946 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.2, < 25.0.6 Version: >= 26.0.0, < 26.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:24.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38" }, { "name": "https://github.com/nextcloud/text/pull/3946", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/3946" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.2, \u003c 25.0.6" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server provides a home for data. A regression in the session handling between Nextcloud Server and the Nextcloud Text app prevented a correct destruction of the session on logout if cookies were not cleared manually. After successfully authenticating with any other account the previous session would be continued and the attacker would be authenticated as the previously logged in user. It is recommended that the Nextcloud Server is upgraded to 25.0.6 or 26.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613: Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T17:21:17.942Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q8c4-chpj-6v38" }, { "name": "https://github.com/nextcloud/text/pull/3946", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/3946" } ], "source": { "advisory": "GHSA-q8c4-chpj-6v38", "discovery": "UNKNOWN" }, "title": "User session not correctly destroyed on logout" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32318", "datePublished": "2023-05-26T17:21:17.942Z", "dateReserved": "2023-05-08T13:26:03.879Z", "dateUpdated": "2024-08-02T15:10:24.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24889
Vulnerability from cvelistv5
Published
2022-04-27 14:35
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/30615 | x_refsource_MISC | |
https://hackerone.com/reports/1403614 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 21.0.8 Version: < 22.2.4 Version: < 23.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/30615" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1403614" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 21.0.8" }, { "status": "affected", "version": "\u003c 22.2.4" }, { "status": "affected", "version": "\u003c 23.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling \"recommended\" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:07:42", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/30615" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1403614" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-5vw6-6prg-gvw6", "discovery": "UNKNOWN" }, "title": "Insufficient Verification of Data Authenticity in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24889", "STATE": "PUBLIC", "TITLE": "Insufficient Verification of Data Authenticity in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 21.0.8" }, { "version_value": "\u003c 22.2.4" }, { "version_value": "\u003c 23.0.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling \"recommended\" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345: Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6" }, { "name": "https://github.com/nextcloud/server/pull/30615", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/30615" }, { "name": "https://hackerone.com/reports/1403614", "refsource": "MISC", "url": "https://hackerone.com/reports/1403614" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-5vw6-6prg-gvw6", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24889", "datePublished": "2022-04-27T14:35:13", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24887
Vulnerability from cvelistv5
Published
2022-04-27 13:55
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j45w-7mpq-264c | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/6410 | x_refsource_MISC | |
https://hackerone.com/reports/1358977 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 11.3.4 Version: < 12.2.2 Version: < 13.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j45w-7mpq-264c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/6410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1358977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 11.3.4" }, { "status": "affected", "version": "\u003c 12.2.2" }, { "status": "affected", "version": "\u003c 13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T13:55:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j45w-7mpq-264c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/6410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1358977" } ], "source": { "advisory": "GHSA-j45w-7mpq-264c", "discovery": "UNKNOWN" }, "title": "Open Redirect in Nextcloud Talk", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24887", "STATE": "PUBLIC", "TITLE": "Open Redirect in Nextcloud Talk" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 11.3.4" }, { "version_value": "\u003c 12.2.2" }, { "version_value": "\u003c 13.0.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j45w-7mpq-264c", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j45w-7mpq-264c" }, { "name": "https://github.com/nextcloud/spreed/pull/6410", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/6410" }, { "name": "https://hackerone.com/reports/1358977", "refsource": "MISC", "url": "https://hackerone.com/reports/1358977" } ] }, "source": { "advisory": "GHSA-j45w-7mpq-264c", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24887", "datePublished": "2022-04-27T13:55:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:00.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48301
Vulnerability from cvelistv5
Published
2023-11-21 21:26
Modified
2024-10-11 14:20
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/circles/pull/1415 | x_refsource_MISC | |
https://hackerone.com/reports/2210038 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.13 Version: >= 26.0.0, < 26.0.8 Version: >= 27.0.0, < 27.1.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6" }, { "name": "https://github.com/nextcloud/circles/pull/1415", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/circles/pull/1415" }, { "name": "https://hackerone.com/reports/2210038", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2210038" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48301", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-12-21T20:45:24.358631Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T14:20:17.201Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.13" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.8" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T21:26:21.288Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6" }, { "name": "https://github.com/nextcloud/circles/pull/1415", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/circles/pull/1415" }, { "name": "https://hackerone.com/reports/2210038", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2210038" } ], "source": { "advisory": "GHSA-wgpw-qqq2-gwv6", "discovery": "UNKNOWN" }, "title": "Nextcloud Server HTML injection in search UI when selecting a circle with HTML in the display name" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48301", "datePublished": "2023-11-21T21:26:21.288Z", "dateReserved": "2023-11-14T17:41:15.571Z", "dateUpdated": "2024-10-11T14:20:17.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25816
Vulnerability from cvelistv5
Published
2023-02-24 23:17
Modified
2024-08-02 11:32
Severity ?
EPSS score ?
Summary
Nextcloud is an Open Source private cloud software. Versions 25.0.0 and above, prior to 25.0.3, are subject to Uncontrolled Resource Consumption. A user can configure a very long password, consuming more resources on password validation than desired. This issue is patched in 25.0.3 No workaround is available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/35965 | x_refsource_MISC | |
https://hackerone.com/reports/1820864 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83" }, { "name": "https://github.com/nextcloud/server/pull/35965", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/35965" }, { "name": "https://hackerone.com/reports/1820864", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1820864" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an Open Source private cloud software. Versions 25.0.0 and above, prior to 25.0.3, are subject to Uncontrolled Resource Consumption. A user can configure a very long password, consuming more resources on password validation than desired. This issue is patched in 25.0.3 No workaround is available.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-24T23:17:41.839Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83" }, { "name": "https://github.com/nextcloud/server/pull/35965", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/35965" }, { "name": "https://hackerone.com/reports/1820864", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1820864" } ], "source": { "advisory": "GHSA-53q2-cm29-7j83", "discovery": "UNKNOWN" }, "title": "nextcloud vulnerable to Uncontrolled Resource Consumption" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25816", "datePublished": "2023-02-24T23:17:41.839Z", "dateReserved": "2023-02-15T16:34:48.773Z", "dateUpdated": "2024-08-02T11:32:12.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28644
Vulnerability from cvelistv5
Published
2023-03-30 18:36
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source home cloud implementation. In releases of the 25.0.x branch before 25.0.3 an inefficient fetch operation may impact server performances and/or can lead to a denial of service. This issue has been addressed and it is recommended that the Nextcloud Server is upgraded to 25.0.3. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9wmj-gp8v-477j | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/36016 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9wmj-gp8v-477j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9wmj-gp8v-477j" }, { "name": "https://github.com/nextcloud/server/pull/36016", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source home cloud implementation. In releases of the 25.0.x branch before 25.0.3 an inefficient fetch operation may impact server performances and/or can lead to a denial of service. This issue has been addressed and it is recommended that the Nextcloud Server is upgraded to 25.0.3. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:36:27.380Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9wmj-gp8v-477j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9wmj-gp8v-477j" }, { "name": "https://github.com/nextcloud/server/pull/36016", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36016" } ], "source": { "advisory": "GHSA-9wmj-gp8v-477j", "discovery": "UNKNOWN" }, "title": "Reference fetch can saturate the server bandwidth for 10 seconds in nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28644", "datePublished": "2023-03-30T18:36:27.380Z", "dateReserved": "2023-03-20T12:19:47.209Z", "dateUpdated": "2024-08-02T13:43:23.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35171
Vulnerability from cvelistv5
Published
2023-06-23 20:44
Modified
2024-11-07 18:46
Severity ?
EPSS score ?
Summary
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38194 | x_refsource_MISC | |
https://hackerone.com/reports/1977222 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 26.0.0, < 26.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:23:59.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4" }, { "name": "https://github.com/nextcloud/server/pull/38194", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38194" }, { "name": "https://hackerone.com/reports/1977222", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1977222" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35171", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T18:46:43.035003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T18:46:56.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker\u0027s site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T20:44:34.272Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4" }, { "name": "https://github.com/nextcloud/server/pull/38194", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38194" }, { "name": "https://hackerone.com/reports/1977222", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1977222" } ], "source": { "advisory": "GHSA-h353-vvwv-j2r4", "discovery": "UNKNOWN" }, "title": "Nextcloud Server vulnerable to open redirect on \"Unsupported browser\" warning" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35171", "datePublished": "2023-06-23T20:44:34.272Z", "dateReserved": "2023-06-14T14:17:52.180Z", "dateUpdated": "2024-11-07T18:46:56.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52523
Vulnerability from cvelistv5
Published
2024-11-15 16:35
Modified
2024-11-15 17:06
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-42w6-r45m-9w9j | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/49009 | x_refsource_MISC | |
https://github.com/nextcloud/server/commit/8a13f284765bd4606984e7d925c32ae6e82b8a27 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 28.0.0, < 28.0.12 Version: >= 29.0.0, < 29.0.9 Version: >= 30.0.0, < 30.0.2 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:05:58.667464Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:06:22.449Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.12" }, { "status": "affected", "version": "\u003e= 29.0.0, \u003c 29.0.9" }, { "status": "affected", "version": "\u003e= 30.0.0, \u003c 30.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:35:39.424Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-42w6-r45m-9w9j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-42w6-r45m-9w9j" }, { "name": "https://github.com/nextcloud/server/pull/49009", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/49009" }, { "name": "https://github.com/nextcloud/server/commit/8a13f284765bd4606984e7d925c32ae6e82b8a27", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/commit/8a13f284765bd4606984e7d925c32ae6e82b8a27" } ], "source": { "advisory": "GHSA-42w6-r45m-9w9j", "discovery": "UNKNOWN" }, "title": "Nextcloud Server Custom defined credentials of external storages are sent back to the frontend" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52523", "datePublished": "2024-11-15T16:35:39.424Z", "dateReserved": "2024-11-11T18:49:23.560Z", "dateUpdated": "2024-11-15T17:06:22.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39212
Vulnerability from cvelistv5
Published
2022-09-16 23:15
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud Talk is an open source chat, video & audio calls client for the Nextcloud platform. In affected versions an attacker could see the last video frame of any participant who has video disabled but a camera selected. It is recommended that the Nextcloud Talk app is upgraded to 13.0.8 or 14.0.4. Users unable to upgrade should select "None" as camera before joining the call.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/7673 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 13.0.8 Version: >= 14.0.0, < 14.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/7673" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 13.0.8" }, { "status": "affected", "version": "\u003e= 14.0.0, \u003c 14.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is an open source chat, video \u0026 audio calls client for the Nextcloud platform. In affected versions an attacker could see the last video frame of any participant who has video disabled but a camera selected. It is recommended that the Nextcloud Talk app is upgraded to 13.0.8 or 14.0.4. Users unable to upgrade should select \"None\" as camera before joining the call." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T23:15:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/7673" } ], "source": { "advisory": "GHSA-wq3g-2x46-q2gv", "discovery": "UNKNOWN" }, "title": "Last video frame is still sent after video is disabled in a call in Nextcloud Talk", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-39212", "STATE": "PUBLIC", "TITLE": "Last video frame is still sent after video is disabled in a call in Nextcloud Talk" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 13.0.8" }, { "version_value": "\u003e= 14.0.0, \u003c 14.0.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Talk is an open source chat, video \u0026 audio calls client for the Nextcloud platform. In affected versions an attacker could see the last video frame of any participant who has video disabled but a camera selected. It is recommended that the Nextcloud Talk app is upgraded to 13.0.8 or 14.0.4. Users unable to upgrade should select \"None\" as camera before joining the call." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv" }, { "name": "https://github.com/nextcloud/spreed/pull/7673", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/7673" } ] }, "source": { "advisory": "GHSA-wq3g-2x46-q2gv", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39212", "datePublished": "2022-09-16T23:15:13", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39952
Vulnerability from cvelistv5
Published
2023-08-10 13:50
Modified
2024-10-08 14:48
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq | x_refsource_CONFIRM | |
https://github.com/nextcloud/groupfolders/issues/1906 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/38890 | x_refsource_MISC | |
https://hackerone.com/reports/1808079 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 22.0.0, < 22.2.10.13 Version: >= 23.0.0, < 23.0.12.8 Version: >= 24.0.0, < 24.0.12.4 Version: >= 25.0.0, < 25.0.8 Version: >= 26.0.0, < 26.0.3 Version: >= 27.0.0, < 27.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq" }, { "name": "https://github.com/nextcloud/groupfolders/issues/1906", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/groupfolders/issues/1906" }, { "name": "https://github.com/nextcloud/server/pull/38890", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38890" }, { "name": "https://hackerone.com/reports/1808079", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1808079" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39952", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T14:30:36.366824Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:48:25.374Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.13" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.8" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.4" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.8" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.3" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:50:50.528Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-cq8w-v4fh-4rjq" }, { "name": "https://github.com/nextcloud/groupfolders/issues/1906", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/groupfolders/issues/1906" }, { "name": "https://github.com/nextcloud/server/pull/38890", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38890" }, { "name": "https://hackerone.com/reports/1808079", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1808079" } ], "source": { "advisory": "GHSA-cq8w-v4fh-4rjq", "discovery": "UNKNOWN" }, "title": "Advanced permissions not respected when copying entire group folders" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39952", "datePublished": "2023-08-10T13:50:50.528Z", "dateReserved": "2023-08-07T16:27:27.075Z", "dateUpdated": "2024-10-08T14:48:25.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22473
Vulnerability from cvelistv5
Published
2023-01-09 14:07
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx | x_refsource_CONFIRM | |
https://github.com/nextcloud/talk-android/pull/2598 | x_refsource_MISC | |
https://hackerone.com/reports/1784645 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 15.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx" }, { "name": "https://github.com/nextcloud/talk-android/pull/2598", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/talk-android/pull/2598" }, { "name": "https://hackerone.com/reports/1784645", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1784645" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 15.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Talk-Android enables users to have video \u0026 audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user\u0027s Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target\u0027s device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2. \n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T14:07:14.923Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx" }, { "name": "https://github.com/nextcloud/talk-android/pull/2598", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/talk-android/pull/2598" }, { "name": "https://hackerone.com/reports/1784645", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1784645" } ], "source": { "advisory": "GHSA-wvr4-gc4c-6vmx", "discovery": "UNKNOWN" }, "title": "Passcode bypass on Talk-Android app" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22473", "datePublished": "2023-01-09T14:07:14.923Z", "dateReserved": "2022-12-29T03:00:40.880Z", "dateUpdated": "2024-08-02T10:13:48.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41969
Vulnerability from cvelistv5
Published
2022-12-01 20:47
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.11, 24.0.7, and 25.0.0, there is no password length limit when creating a user as an administrator. An administrator can cause a limited DoS attack against their own server. Versions 23.0.11, 24.0.7, and 25.0.0 contain a fix for the issue. As a workaround, don't create user accounts with long passwords.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/34500 | x_refsource_MISC | |
https://hackerone.com/reports/1727424 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.11 Version: >= 24.0.0, < 24.0.7 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:39.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx" }, { "name": "https://github.com/nextcloud/server/pull/34500", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/34500" }, { "name": "https://hackerone.com/reports/1727424", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1727424" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.11" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.11, 24.0.7, and 25.0.0, there is no password length limit when creating a user as an administrator. An administrator can cause a limited DoS attack against their own server. Versions 23.0.11, 24.0.7, and 25.0.0 contain a fix for the issue. As a workaround, don\u0027t create user accounts with long passwords." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-01T20:47:50.466Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx" }, { "name": "https://github.com/nextcloud/server/pull/34500", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/34500" }, { "name": "https://hackerone.com/reports/1727424", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1727424" } ], "source": { "advisory": "GHSA-4gm7-j7wg-m4fx", "discovery": "UNKNOWN" }, "title": "Nextcloud Server has no password length limit when creating a user as an administrator" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41969", "datePublished": "2022-12-01T20:47:50.466Z", "dateReserved": "2022-09-30T16:38:28.956Z", "dateUpdated": "2024-08-03T12:56:39.151Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29163
Vulnerability from cvelistv5
Published
2022-05-20 16:00
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx | x_refsource_CONFIRM | |
https://github.com/nextcloud/circles/pull/866 | x_refsource_MISC | |
https://github.com/nextcloud/circles/pull/926 | x_refsource_MISC | |
https://hackerone.com/reports/1406926 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 22.2.6 Version: >= 23.0.0, < 23.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:53.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/circles/pull/866" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/circles/pull/926" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1406926" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 22.2.6" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-671", "description": "CWE-671: Lack of Administrator Control over Security", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-20T16:00:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/circles/pull/866" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/circles/pull/926" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1406926" } ], "source": { "advisory": "GHSA-pwjv-h37v-c4fx", "discovery": "UNKNOWN" }, "title": "Bypass of password requirements when sharing a folder via the Circles app in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-29163", "STATE": "PUBLIC", "TITLE": "Bypass of password requirements when sharing a folder via the Circles app in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 22.2.6" }, { "version_value": "\u003e= 23.0.0, \u003c 23.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-671: Lack of Administrator Control over Security" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx" }, { "name": "https://github.com/nextcloud/circles/pull/866", "refsource": "MISC", "url": "https://github.com/nextcloud/circles/pull/866" }, { "name": "https://github.com/nextcloud/circles/pull/926", "refsource": "MISC", "url": "https://github.com/nextcloud/circles/pull/926" }, { "name": "https://hackerone.com/reports/1406926", "refsource": "MISC", "url": "https://hackerone.com/reports/1406926" } ] }, "source": { "advisory": "GHSA-pwjv-h37v-c4fx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29163", "datePublished": "2022-05-20T16:00:15", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:17:53.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29243
Vulnerability from cvelistv5
Published
2022-05-31 16:15
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/31658 | x_refsource_MISC | |
https://hackerone.com/reports/1153138 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 22.2.7 Version: >= 23.0.0, < 23.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/31658" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1153138" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 22.2.7" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:08:59", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/31658" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1153138" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-7cwm-qph5-4h5w", "discovery": "UNKNOWN" }, "title": "Improper input-size validation on the user new session name in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-29243", "STATE": "PUBLIC", "TITLE": "Improper input-size validation on the user new session name in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 22.2.7" }, { "version_value": "\u003e= 23.0.0, \u003c 23.0.4" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w" }, { "name": "https://github.com/nextcloud/server/pull/31658", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/31658" }, { "name": "https://hackerone.com/reports/1153138", "refsource": "MISC", "url": "https://hackerone.com/reports/1153138" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-7cwm-qph5-4h5w", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29243", "datePublished": "2022-05-31T16:15:14", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:17:54.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37882
Vulnerability from cvelistv5
Published
2024-06-14 15:28
Modified
2024-08-02 03:57
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. A recipient of a share with read&share permissions could reshare the item with more permissions. It is recommended that the Nextcloud Server is upgraded to 26.0.13 or 27.1.8 or 28.0.4 and that the Nextcloud Enterprise Server is upgraded to 26.0.13 or 27.1.8 or 28.0.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/44339 | x_refsource_MISC | |
https://hackerone.com/reports/2289425 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 26.0.0, < 26.0.13 Version: >= 27.0.0, < 27.1.8 Version: >= 28.0.0, < 28.0.4 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37882", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T20:09:57.594506Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T20:10:15.423Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:39.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq" }, { "name": "https://github.com/nextcloud/server/pull/44339", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/44339" }, { "name": "https://hackerone.com/reports/2289425", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2289425" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.13" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.8" }, { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. A recipient of a share with read\u0026share permissions could reshare the item with more permissions. It is recommended that the Nextcloud Server is upgraded to 26.0.13 or 27.1.8 or 28.0.4 and that the Nextcloud Enterprise Server is upgraded to 26.0.13 or 27.1.8 or 28.0.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:28:00.462Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq" }, { "name": "https://github.com/nextcloud/server/pull/44339", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/44339" }, { "name": "https://hackerone.com/reports/2289425", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2289425" } ], "source": { "advisory": "GHSA-jjm3-j9xh-5xmq", "discovery": "UNKNOWN" }, "title": "Nextcloud Server can reshare read\u0026share only folder with more permissions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37882", "datePublished": "2024-06-14T15:28:00.462Z", "dateReserved": "2024-06-10T19:54:41.359Z", "dateUpdated": "2024-08-02T03:57:39.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25817
Vulnerability from cvelistv5
Published
2023-03-27 20:04
Modified
2024-08-02 11:32
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/33941 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 24.0.0, < 24.0.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv" }, { "name": "https://github.com/nextcloud/server/pull/33941", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/33941" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T20:04:15.316Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv" }, { "name": "https://github.com/nextcloud/server/pull/33941", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/33941" } ], "source": { "advisory": "GHSA-8v5c-f752-fgpv", "discovery": "UNKNOWN" }, "title": "Delete permissions are not saved when creating public share in Nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25817", "datePublished": "2023-03-27T20:04:15.316Z", "dateReserved": "2023-02-15T16:34:48.773Z", "dateUpdated": "2024-08-02T11:32:12.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32733
Vulnerability from cvelistv5
Published
2021-07-12 21:05
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Nextcloud Text is a collaborative document editing application that uses Markdown. A cross-site scripting vulnerability is present in versions prior to 19.0.13, 20.0.11, and 21.0.3. The Nextcloud Text application shipped with Nextcloud server used a `text/html` Content-Type when serving files to users. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, use a browser that has support for Content-Security-Policy.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/1689 | x_refsource_MISC | |
https://hackerone.com/reports/1241460 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/1689" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1241460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Text is a collaborative document editing application that uses Markdown. A cross-site scripting vulnerability is present in versions prior to 19.0.13, 20.0.11, and 21.0.3. The Nextcloud Text application shipped with Nextcloud server used a `text/html` Content-Type when serving files to users. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, use a browser that has support for Content-Security-Policy." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T21:05:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/1689" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1241460" } ], "source": { "advisory": "GHSA-x4w3-jhcr-57pq", "discovery": "UNKNOWN" }, "title": "XSS in Nextcloud Text application", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32733", "STATE": "PUBLIC", "TITLE": "XSS in Nextcloud Text application" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Text is a collaborative document editing application that uses Markdown. A cross-site scripting vulnerability is present in versions prior to 19.0.13, 20.0.11, and 21.0.3. The Nextcloud Text application shipped with Nextcloud server used a `text/html` Content-Type when serving files to users. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, use a browser that has support for Content-Security-Policy." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq" }, { "name": "https://github.com/nextcloud/text/pull/1689", "refsource": "MISC", "url": "https://github.com/nextcloud/text/pull/1689" }, { "name": "https://hackerone.com/reports/1241460", "refsource": "MISC", "url": "https://hackerone.com/reports/1241460" } ] }, "source": { "advisory": "GHSA-x4w3-jhcr-57pq", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32733", "datePublished": "2021-07-12T21:05:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32655
Vulnerability from cvelistv5
Published
2021-06-01 20:55
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to convert a Files Drop link to a federated share. This causes an issue on the UI side of the sharing user. When the sharing user opens the sharing panel and tries to remove the "Create" privileges of this unexpected share, Nextcloud server would silently grant the share read privileges. The vulnerability is patched in versions 19.0.11, 20.0.10 and 21.0.2. No workarounds are known to exist.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-grph-cm44-p3jv | x_refsource_CONFIRM | |
https://hackerone.com/reports/1167929 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.11 Version: >= 20.0.0, < 20.0.10 Version: >= 21.0.0, < 21.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-grph-cm44-p3jv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1167929" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.11" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.10" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to convert a Files Drop link to a federated share. This causes an issue on the UI side of the sharing user. When the sharing user opens the sharing panel and tries to remove the \"Create\" privileges of this unexpected share, Nextcloud server would silently grant the share read privileges. The vulnerability is patched in versions 19.0.11, 20.0.10 and 21.0.2. No workarounds are known to exist." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-241", "description": "CWE-241: Improper Handling of Unexpected Data Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:11:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-grph-cm44-p3jv" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1167929" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-grph-cm44-p3jv", "discovery": "UNKNOWN" }, "title": "Files Drop public link can be added as federated share", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32655", "STATE": "PUBLIC", "TITLE": "Files Drop public link can be added as federated share" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.11" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.10" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to convert a Files Drop link to a federated share. This causes an issue on the UI side of the sharing user. When the sharing user opens the sharing panel and tries to remove the \"Create\" privileges of this unexpected share, Nextcloud server would silently grant the share read privileges. The vulnerability is patched in versions 19.0.11, 20.0.10 and 21.0.2. No workarounds are known to exist." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-241: Improper Handling of Unexpected Data Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-grph-cm44-p3jv", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-grph-cm44-p3jv" }, { "name": "https://hackerone.com/reports/1167929", "refsource": "MISC", "url": "https://hackerone.com/reports/1167929" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-grph-cm44-p3jv", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32655", "datePublished": "2021-06-01T20:55:09", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48302
Vulnerability from cvelistv5
Published
2023-11-21 21:53
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87 | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/4877 | x_refsource_MISC | |
https://hackerone.com/reports/2211561 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.13 Version: >= 26.0.0, < 26.0.8 Version: >= 27.0.0, < 27.1.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87" }, { "name": "https://github.com/nextcloud/text/pull/4877", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/4877" }, { "name": "https://hackerone.com/reports/2211561", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2211561" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.13" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.8" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T21:53:00.327Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p7g9-x25m-4h87" }, { "name": "https://github.com/nextcloud/text/pull/4877", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/4877" }, { "name": "https://hackerone.com/reports/2211561", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2211561" } ], "source": { "advisory": "GHSA-p7g9-x25m-4h87", "discovery": "UNKNOWN" }, "title": "Nextcloud Server vulnerable to Self XSS when pasting HTML into Text app with Ctrl+Shift+V" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48302", "datePublished": "2023-11-21T21:53:00.327Z", "dateReserved": "2023-11-14T17:41:15.571Z", "dateUpdated": "2024-08-02T21:23:39.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32680
Vulnerability from cvelistv5
Published
2021-07-12 13:25
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Server is a Nextcloud package that handles data storage. In versions priot to 19.0.13, 20.0.11, and 21.0.3, Nextcloud Server audit logging functionality wasn't properly logging events for the unsetting of a share expiration date. This event is supposed to be logged. This issue is patched in versions 19.0.13, 20.0.11, and 21.0.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/27024 | x_refsource_MISC | |
https://hackerone.com/reports/1200810 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 19.0.13 Version: >= 20.0.0, < 20.0.11 Version: >= 21.0.0, < 21.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.089Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/27024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1200810" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 19.0.13" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.11" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions priot to 19.0.13, 20.0.11, and 21.0.3, Nextcloud Server audit logging functionality wasn\u0027t properly logging events for the unsetting of a share expiration date. This event is supposed to be logged. This issue is patched in versions 19.0.13, 20.0.11, and 21.0.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-778", "description": "CWE-778: Insufficient Logging", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:08:46", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/27024" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1200810" }, { "name": "FEDORA-2021-9b421b78af", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-fxpq-wq7c-vppf", "discovery": "UNKNOWN" }, "title": "Audit log is not properly logging unsetting of share expiration date", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32680", "STATE": "PUBLIC", "TITLE": "Audit log is not properly logging unsetting of share expiration date" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 19.0.13" }, { "version_value": "\u003e= 20.0.0, \u003c 20.0.11" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Server is a Nextcloud package that handles data storage. In versions priot to 19.0.13, 20.0.11, and 21.0.3, Nextcloud Server audit logging functionality wasn\u0027t properly logging events for the unsetting of a share expiration date. This event is supposed to be logged. This issue is patched in versions 19.0.13, 20.0.11, and 21.0.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-778: Insufficient Logging" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf" }, { "name": "https://github.com/nextcloud/server/pull/27024", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/27024" }, { "name": "https://hackerone.com/reports/1200810", "refsource": "MISC", "url": "https://hackerone.com/reports/1200810" }, { "name": "FEDORA-2021-9b421b78af", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/" }, { "name": "FEDORA-2021-6f327296fe", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-fxpq-wq7c-vppf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32680", "datePublished": "2021-07-12T13:25:16", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39224
Vulnerability from cvelistv5
Published
2021-10-25 21:40
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h | x_refsource_CONFIRM | |
https://github.com/nextcloud/officeonline/pull/204 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/officeonline/pull/204" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T21:40:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/officeonline/pull/204" } ], "source": { "advisory": "GHSA-56wm-r6jm-3v9h", "discovery": "UNKNOWN" }, "title": "File path disclosure of shared files in OfficeOnline application", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39224", "STATE": "PUBLIC", "TITLE": "File path disclosure of shared files in OfficeOnline application" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.1.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h" }, { "name": "https://github.com/nextcloud/officeonline/pull/204", "refsource": "MISC", "url": "https://github.com/nextcloud/officeonline/pull/204" } ] }, "source": { "advisory": "GHSA-56wm-r6jm-3v9h", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39224", "datePublished": "2021-10-25T21:40:17", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23944
Vulnerability from cvelistv5
Published
2023-02-06 19:35
Modified
2024-08-02 10:49
Severity ?
EPSS score ?
Summary
Nextcloud mail is an email app for the nextcloud home server platform. In versions prior to 2.2.2 user's passwords were stored in cleartext in the database during the duration of OAuth2 setup procedure. Any attacker or malicious user with access to the database would have access to these user passwords until the OAuth setup has been completed. It is recommended that the Nextcloud Mail app is upgraded to 2.2.2. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-x755-93f4 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/7797 | x_refsource_MISC | |
https://hackerone.com/reports/1806275 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 2.2.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:49:07.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-x755-93f4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-x755-93f4" }, { "name": "https://github.com/nextcloud/mail/pull/7797", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/7797" }, { "name": "https://hackerone.com/reports/1806275", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1806275" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 2.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud mail is an email app for the nextcloud home server platform. In versions prior to 2.2.2 user\u0027s passwords were stored in cleartext in the database during the duration of OAuth2 setup procedure. Any attacker or malicious user with access to the database would have access to these user passwords until the OAuth setup has been completed. It is recommended that the Nextcloud Mail app is upgraded to 2.2.2. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-06T19:35:31.498Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-x755-93f4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g86r-x755-93f4" }, { "name": "https://github.com/nextcloud/mail/pull/7797", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/7797" }, { "name": "https://hackerone.com/reports/1806275", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1806275" } ], "source": { "advisory": "GHSA-g86r-x755-93f4", "discovery": "UNKNOWN" }, "title": "Nexcloud Mail app temporarily stores cleartext password in database" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23944", "datePublished": "2023-02-06T19:35:31.498Z", "dateReserved": "2023-01-19T21:12:31.362Z", "dateUpdated": "2024-08-02T10:49:07.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45150
Vulnerability from cvelistv5
Published
2023-10-16 19:06
Modified
2024-09-16 14:31
Severity ?
EPSS score ?
Summary
Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452 | x_refsource_CONFIRM | |
https://github.com/nextcloud/calendar/pull/5358 | x_refsource_MISC | |
https://hackerone.com/reports/2058337 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.0.0, < 4.4.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452" }, { "name": "https://github.com/nextcloud/calendar/pull/5358", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/calendar/pull/5358" }, { "name": "https://hackerone.com/reports/2058337", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2058337" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:nextcloud:calendar:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "calendar", "vendor": "nextcloud", "versions": [ { "lessThan": "4.4.4", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-45150", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T14:21:52.639896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T14:31:05.835Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.0.0, \u003c 4.4.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T19:06:03.674Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452" }, { "name": "https://github.com/nextcloud/calendar/pull/5358", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/calendar/pull/5358" }, { "name": "https://hackerone.com/reports/2058337", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2058337" } ], "source": { "advisory": "GHSA-r936-8gwm-w452", "discovery": "UNKNOWN" }, "title": "Inviting excessive long email addresses to a calendar event makes the Nextcloud server unresponsive" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-45150", "datePublished": "2023-10-16T19:06:03.674Z", "dateReserved": "2023-10-04T16:02:46.331Z", "dateUpdated": "2024-09-16T14:31:05.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39955
Vulnerability from cvelistv5
Published
2023-08-10 14:53
Modified
2024-10-04 18:23
Severity ?
EPSS score ?
Summary
Notes is a note-taking app for Nextcloud, an open-source cloud platform. Starting in version 4.4.0 and prior to version 4.8.0, when creating a note file with HTML, the content is rendered in the preview instead of the file being offered to download. Nextcloud Notes app version 4.8.0 contains a patch for the issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/notes/pull/1031 | x_refsource_MISC | |
https://hackerone.com/reports/1924355 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 4.4.0, < 4.8.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6" }, { "name": "https://github.com/nextcloud/notes/pull/1031", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/notes/pull/1031" }, { "name": "https://hackerone.com/reports/1924355", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1924355" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39955", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:23:45.756444Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T18:23:55.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 4.4.0, \u003c 4.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Notes is a note-taking app for Nextcloud, an open-source cloud platform. Starting in version 4.4.0 and prior to version 4.8.0, when creating a note file with HTML, the content is rendered in the preview instead of the file being offered to download. Nextcloud Notes app version 4.8.0 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T14:53:42.626Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6" }, { "name": "https://github.com/nextcloud/notes/pull/1031", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/notes/pull/1031" }, { "name": "https://hackerone.com/reports/1924355", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1924355" } ], "source": { "advisory": "GHSA-6g88-37x7-4vw6", "discovery": "UNKNOWN" }, "title": "Notes attachment render HTML in preview mode" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39955", "datePublished": "2023-08-10T14:53:42.626Z", "dateReserved": "2023-08-07T16:27:27.075Z", "dateUpdated": "2024-10-04T18:23:55.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39225
Vulnerability from cvelistv5
Published
2021-10-25 21:40
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72 | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/3316 | x_refsource_MISC | |
https://hackerone.com/reports/1331728 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.2.9 Version: >= 1.4.0, < 1.4.5 Version: >= 1.5.0, < 1.5.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/3316" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1331728" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.2.9" }, { "status": "affected", "version": "\u003e= 1.4.0, \u003c 1.4.5" }, { "status": "affected", "version": "\u003e= 1.5.0, \u003c 1.5.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-25T21:40:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/3316" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1331728" } ], "source": { "advisory": "GHSA-2x96-38qg-3m72", "discovery": "UNKNOWN" }, "title": "Missing permission check on Deck API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39225", "STATE": "PUBLIC", "TITLE": "Missing permission check on Deck API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.2.9" }, { "version_value": "\u003e= 1.4.0, \u003c 1.4.5" }, { "version_value": "\u003e= 1.5.0, \u003c 1.5.3" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639: Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72" }, { "name": "https://github.com/nextcloud/deck/pull/3316", "refsource": "MISC", "url": "https://github.com/nextcloud/deck/pull/3316" }, { "name": "https://hackerone.com/reports/1331728", "refsource": "MISC", "url": "https://hackerone.com/reports/1331728" } ] }, "source": { "advisory": "GHSA-2x96-38qg-3m72", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39225", "datePublished": "2021-10-25T21:40:11", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22472
Vulnerability from cvelistv5
Published
2023-01-09 13:54
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc). There are currently no known workarounds. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gfv-xqpx-42qj | x_refsource_CONFIRM | |
https://github.com/nextcloud/desktop/pull/5106 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: <= 3.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gfv-xqpx-42qj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gfv-xqpx-42qj" }, { "name": "https://github.com/nextcloud/desktop/pull/5106", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c= 3.6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc). There are currently no known workarounds. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-09T13:54:53.199Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gfv-xqpx-42qj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gfv-xqpx-42qj" }, { "name": "https://github.com/nextcloud/desktop/pull/5106", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/5106" } ], "source": { "advisory": "GHSA-4gfv-xqpx-42qj", "discovery": "UNKNOWN" }, "title": "Nextcloud Deck Desktop Client is vulnerable to Cross-Site Request Forgery (CSRF) via malicious link" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22472", "datePublished": "2023-01-09T13:54:53.199Z", "dateReserved": "2022-12-29T03:00:40.880Z", "dateUpdated": "2024-08-02T10:13:48.521Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37628
Vulnerability from cvelistv5
Published
2021-09-07 20:15
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/1664 | x_refsource_MISC | |
https://hackerone.com/reports/1253403 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.8.4 Version: >= 4.0.0, < 4.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/1664" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1253403" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.8.4" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features (\"Upload Only\" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-07T20:15:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/1664" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1253403" } ], "source": { "advisory": "GHSA-pxhh-954f-8w7w", "discovery": "UNKNOWN" }, "title": "File Drop can be bypassed using Richdocuments app in nextcloud", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37628", "STATE": "PUBLIC", "TITLE": "File Drop can be bypassed using Richdocuments app in nextcloud" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.8.4" }, { "version_value": "\u003e= 4.0.0, \u003c 4.2.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features (\"Upload Only\" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-639: Authorization Bypass Through User-Controlled Key" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w" }, { "name": "https://github.com/nextcloud/richdocuments/pull/1664", "refsource": "MISC", "url": "https://github.com/nextcloud/richdocuments/pull/1664" }, { "name": "https://hackerone.com/reports/1253403", "refsource": "MISC", "url": "https://hackerone.com/reports/1253403" } ] }, "source": { "advisory": "GHSA-pxhh-954f-8w7w", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37628", "datePublished": "2021-09-07T20:15:11", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25579
Vulnerability from cvelistv5
Published
2023-02-22 18:21
Modified
2024-08-02 11:25
Severity ?
EPSS score ?
Summary
Nextcloud server is a self hosted home cloud product. In affected versions the `OC\Files\Node\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/35074 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 23.0.12 Version: >= 24.0.0, < 24.0.8 Version: >= 25.0.0, < 25.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:19.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v" }, { "name": "https://github.com/nextcloud/server/pull/35074", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/35074" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 23.0.12" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.8" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is a self hosted home cloud product. In affected versions the `OC\\Files\\Node\\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-22T18:21:10.573Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v" }, { "name": "https://github.com/nextcloud/server/pull/35074", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/35074" } ], "source": { "advisory": "GHSA-273v-9h7x-p68v", "discovery": "UNKNOWN" }, "title": "Directory traversal in Nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25579", "datePublished": "2023-02-22T18:21:10.573Z", "dateReserved": "2023-02-07T17:10:00.743Z", "dateUpdated": "2024-08-02T11:25:19.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28997
Vulnerability from cvelistv5
Published
2023-04-04 12:42
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can recover and modify the contents of end-to-end encrypted files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.0.0, < 3.6.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc" }, { "name": "https://github.com/nextcloud/desktop/pull/5324", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/desktop/pull/5324" }, { "name": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can recover and modify the contents of end-to-end encrypted files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-323", "description": "CWE-323: Reusing a Nonce, Key Pair in Encryption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-04T12:42:24.540Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc" }, { "name": "https://github.com/nextcloud/desktop/pull/5324", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/desktop/pull/5324" }, { "name": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf", "tags": [ "x_refsource_MISC" ], "url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf" } ], "source": { "advisory": "GHSA-4p33-rw27-j5fc", "discovery": "UNKNOWN" }, "title": "Nextcloud Desktop: Initialization vector reuse in E2EE allows malicious server admin to break, manipulate, access files" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28997", "datePublished": "2023-04-04T12:42:24.540Z", "dateReserved": "2023-03-29T17:39:16.141Z", "dateUpdated": "2024-08-02T13:51:38.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39960
Vulnerability from cvelistv5
Published
2023-10-13 12:07
Modified
2024-09-17 20:32
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/38046 | x_refsource_MISC | |
https://hackerone.com/reports/1924212 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 22.0.0, < 22.2.10.14 Version: >= 23.0.0, < 23.0.12.9 Version: >= 24.0.0, < 24.0.12.5 Version: >= 25.0.0, < 25.0.9 Version: >= 26.0.0, < 26.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9" }, { "name": "https://github.com/nextcloud/server/pull/38046", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/38046" }, { "name": "https://hackerone.com/reports/1924212", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1924212" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39960", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-17T20:31:46.041277Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T20:32:00.464Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.14" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.9" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.5" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.9" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-13T12:07:59.934Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9" }, { "name": "https://github.com/nextcloud/server/pull/38046", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/38046" }, { "name": "https://hackerone.com/reports/1924212", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1924212" } ], "source": { "advisory": "GHSA-2hrc-5fgp-c9c9", "discovery": "UNKNOWN" }, "title": "Nextcloud Server has improper restriction of excessive authentication attempts on WebDAV endpoint" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39960", "datePublished": "2023-10-13T12:07:59.934Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-09-17T20:32:00.464Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39963
Vulnerability from cvelistv5
Published
2023-08-10 17:26
Modified
2024-10-10 17:53
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/39416 | x_refsource_MISC | |
https://hackerone.com/reports/2067572 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 20.0.0, < 20.0.14.15 Version: >= 21.0.0, < 21.0.9.13 Version: >= 22.0.0, < 22.2.10.14 Version: >= 23.0.0, < 23.0.12.9 Version: >= 24.0.0, < 24.0.12.5 Version: >= 25.0.0, < 25.0.9 Version: >= 26.0.0, < 26.0.4 Version: >= 27.0.0, < 27.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5" }, { "name": "https://github.com/nextcloud/server/pull/39416", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/39416" }, { "name": "https://hackerone.com/reports/2067572", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2067572" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39963", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T17:52:40.452158Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T17:53:05.396Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 20.0.0, \u003c 20.0.14.15" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.9.13" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.10.14" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.12.9" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.12.5" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.9" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.4" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:26:30.163Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j4qm-5q5x-54m5" }, { "name": "https://github.com/nextcloud/server/pull/39416", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/39416" }, { "name": "https://hackerone.com/reports/2067572", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2067572" } ], "source": { "advisory": "GHSA-j4qm-5q5x-54m5", "discovery": "UNKNOWN" }, "title": "Missing password confirmation when creating app passwords" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39963", "datePublished": "2023-08-10T17:26:30.163Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-10T17:53:05.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39953
Vulnerability from cvelistv5
Published
2023-08-10 13:55
Modified
2024-10-03 15:11
Severity ?
EPSS score ?
Summary
user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, missing verification of the issuer would have allowed an attacker to perform a man-in-the-middle attack returning corrupted or known token they also have access to. user_oidc 1.3.3 contains a patch. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/pull/642 | x_refsource_MISC | |
https://hackerone.com/reports/2021684 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.0.0, < 1.3.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j" }, { "name": "https://github.com/nextcloud/user_oidc/pull/642", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/642" }, { "name": "https://hackerone.com/reports/2021684", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2021684" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39953", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:08:38.977974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:11:48.536Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.0.0, \u003c 1.3.3" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, missing verification of the issuer would have allowed an attacker to perform a man-in-the-middle attack returning corrupted or known token they also have access to. user_oidc 1.3.3 contains a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-303", "description": "CWE-303: Incorrect Implementation of Authentication Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:55:19.957Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j" }, { "name": "https://github.com/nextcloud/user_oidc/pull/642", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/pull/642" }, { "name": "https://hackerone.com/reports/2021684", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2021684" } ], "source": { "advisory": "GHSA-xx3h-v363-q36j", "discovery": "UNKNOWN" }, "title": "Issuer not verified from obtained token in user_oidc" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39953", "datePublished": "2023-08-10T13:55:19.957Z", "dateReserved": "2023-08-07T16:27:27.075Z", "dateUpdated": "2024-10-03T15:11:48.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28645
Vulnerability from cvelistv5
Published
2023-03-31 22:08
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-95j6-p5cj-5hh5 | x_refsource_CONFIRM | |
https://github.com/nextcloud/richdocuments/pull/2604 | x_refsource_MISC | |
https://docs.nextcloud.com/server/latest/admin_manual/office/configuration.html#wopi-settings | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 7.0.0, < 7.0.2 Version: < 6.3.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-95j6-p5cj-5hh5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-95j6-p5cj-5hh5" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2604", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/richdocuments/pull/2604" }, { "name": "https://docs.nextcloud.com/server/latest/admin_manual/office/configuration.html#wopi-settings", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.nextcloud.com/server/latest/admin_manual/office/configuration.html#wopi-settings" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 7.0.0, \u003c 7.0.2" }, { "status": "affected", "version": "\u003c 6.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T22:08:14.938Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-95j6-p5cj-5hh5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-95j6-p5cj-5hh5" }, { "name": "https://github.com/nextcloud/richdocuments/pull/2604", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/richdocuments/pull/2604" }, { "name": "https://docs.nextcloud.com/server/latest/admin_manual/office/configuration.html#wopi-settings", "tags": [ "x_refsource_MISC" ], "url": "https://docs.nextcloud.com/server/latest/admin_manual/office/configuration.html#wopi-settings" } ], "source": { "advisory": "GHSA-95j6-p5cj-5hh5", "discovery": "UNKNOWN" }, "title": "Secure view can be bypassed by using internal API endpoint in Nextcloud richdocuments" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28645", "datePublished": "2023-03-31T22:08:14.938Z", "dateReserved": "2023-03-20T12:19:47.209Z", "dateUpdated": "2024-08-02T13:43:23.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-33182
Vulnerability from cvelistv5
Published
2023-05-30 04:58
Modified
2024-08-02 15:39
Severity ?
EPSS score ?
Summary
Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. The unsanitized SVG is converted to a JavaScript blob (in memory data) that the Avatar can't render. Due to this constellation the missing sanitization does not seem to be exploitable. It is recommended that the Contacts app is upgraded to 5.0.3 or 4.2.4
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hxr6-cx85-gcjx | x_refsource_CONFIRM | |
https://github.com/nextcloud/contacts/pull/3199 | x_refsource_MISC | |
https://hackerone.com/reports/1789602 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 4.1.0, < 4.2.4 Version: >= 5.0.0, < 5.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:39:36.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hxr6-cx85-gcjx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hxr6-cx85-gcjx" }, { "name": "https://github.com/nextcloud/contacts/pull/3199", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/contacts/pull/3199" }, { "name": "https://hackerone.com/reports/1789602", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1789602" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 4.1.0, \u003c 4.2.4" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. The unsanitized SVG is converted to a JavaScript blob (in memory data) that the Avatar can\u0027t render. Due to this constellation the missing sanitization does not seem to be exploitable. It is recommended that the Contacts app is upgraded to 5.0.3 or 4.2.4\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-30T04:58:07.669Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hxr6-cx85-gcjx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hxr6-cx85-gcjx" }, { "name": "https://github.com/nextcloud/contacts/pull/3199", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/contacts/pull/3199" }, { "name": "https://hackerone.com/reports/1789602", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1789602" } ], "source": { "advisory": "GHSA-hxr6-cx85-gcjx", "discovery": "UNKNOWN" }, "title": "Nextcloud Contacts photos only sanitized if mime type is all lower case" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33182", "datePublished": "2023-05-30T04:58:07.669Z", "dateReserved": "2023-05-17T22:25:50.697Z", "dateUpdated": "2024-08-02T15:39:36.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48305
Vulnerability from cvelistv5
Published
2023-11-21 22:17
Modified
2024-11-27 16:07
Severity ?
EPSS score ?
Summary
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/issues/38461 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/40013 | x_refsource_MISC | |
https://hackerone.com/reports/2101165 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 25.0.0, < 25.0.11 Version: >= 26.0.0, < 26.0.6 Version: >= 27.0.0, < 27.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr" }, { "name": "https://github.com/nextcloud/server/issues/38461", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/issues/38461" }, { "name": "https://github.com/nextcloud/server/pull/40013", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/40013" }, { "name": "https://hackerone.com/reports/2101165", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2101165" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48305", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T16:07:07.762399Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T16:07:21.134Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.11" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.6" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users\u0027 passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T22:17:36.124Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr" }, { "name": "https://github.com/nextcloud/server/issues/38461", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/issues/38461" }, { "name": "https://github.com/nextcloud/server/pull/40013", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/40013" }, { "name": "https://hackerone.com/reports/2101165", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2101165" } ], "source": { "advisory": "GHSA-35p6-4992-w5fr", "discovery": "UNKNOWN" }, "title": "Nextcloud Server user_ldap app logs user passwords in the log file on level debug" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48305", "datePublished": "2023-11-21T22:17:36.124Z", "dateReserved": "2023-11-14T17:41:15.572Z", "dateUpdated": "2024-11-27T16:07:21.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41926
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Nextcould talk android is the android OS implementation of the nextcloud talk chat system. In affected versions the receiver is not protected by broadcastPermission allowing malicious apps to monitor communication. It is recommended that the Nextcloud Talk Android is upgraded to 14.1.0. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 14.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-564v-3rfc-352m" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/talk-android/pull/2148" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1596459" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 14.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcould talk android is the android OS implementation of the nextcloud talk chat system. In affected versions the receiver is not protected by broadcastPermission allowing malicious apps to monitor communication. It is recommended that the Nextcloud Talk Android is upgraded to 14.1.0. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-25T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-564v-3rfc-352m" }, { "url": "https://github.com/nextcloud/talk-android/pull/2148" }, { "url": "https://hackerone.com/reports/1596459" } ], "source": { "advisory": "GHSA-564v-3rfc-352m", "discovery": "UNKNOWN" }, "title": "Nextcloud Talk Android broadcast incorrect permission handling" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41926", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-30T00:00:00", "dateUpdated": "2024-08-03T12:56:38.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37883
Vulnerability from cvelistv5
Published
2024-06-14 15:33
Modified
2024-08-02 03:57
Severity ?
EPSS score ?
Summary
Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. A user with access to a deck board was able to access comments and attachments of already deleted cards. It is recommended that the Nextcloud Deck app is upgraded to 1.6.6 or 1.7.5 or 1.8.7 or 1.9.6 or 1.11.3 or 1.12.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x45g-vx69-r9m8 | x_refsource_CONFIRM | |
https://github.com/nextcloud/deck/pull/5423 | x_refsource_MISC | |
https://hackerone.com/reports/2289333 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 1.6.0, < 1.6.6 Version: >= 1.7.0, < 1.7.5 Version: >= 1.8.0, < 1.8.7 Version: >= 1.9.0, < 1.9.6 Version: >= 1.10.0, < 1.11.3 Version: >= 1.11.0, < 1.12.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37883", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-17T14:44:25.886426Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-17T14:44:36.528Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:57:39.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x45g-vx69-r9m8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x45g-vx69-r9m8" }, { "name": "https://github.com/nextcloud/deck/pull/5423", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/deck/pull/5423" }, { "name": "https://hackerone.com/reports/2289333", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/2289333" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 1.6.0, \u003c 1.6.6" }, { "status": "affected", "version": "\u003e= 1.7.0, \u003c 1.7.5" }, { "status": "affected", "version": "\u003e= 1.8.0, \u003c 1.8.7" }, { "status": "affected", "version": "\u003e= 1.9.0, \u003c 1.9.6" }, { "status": "affected", "version": "\u003e= 1.10.0, \u003c 1.11.3" }, { "status": "affected", "version": "\u003e= 1.11.0, \u003c 1.12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. A user with access to a deck board was able to access comments and attachments of already deleted cards. It is recommended that the Nextcloud Deck app is upgraded to 1.6.6 or 1.7.5 or 1.8.7 or 1.9.6 or 1.11.3 or 1.12.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:33:18.525Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x45g-vx69-r9m8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x45g-vx69-r9m8" }, { "name": "https://github.com/nextcloud/deck/pull/5423", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/deck/pull/5423" }, { "name": "https://hackerone.com/reports/2289333", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/2289333" } ], "source": { "advisory": "GHSA-x45g-vx69-r9m8", "discovery": "UNKNOWN" }, "title": "Nextcloud Deck can access comments and attachments of deleted cards" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37883", "datePublished": "2024-06-14T15:33:18.525Z", "dateReserved": "2024-06-10T19:54:41.360Z", "dateUpdated": "2024-08-02T03:57:39.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41178
Vulnerability from cvelistv5
Published
2021-10-25 21:55
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/28726 | x_refsource_MISC | |
https://hackerone.com/reports/1302155 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: 20.0.13 Version: >= 21.0.0, < 21.0.5 Version: < 22.2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28726" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1302155" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "20.0.13" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.5" }, { "status": "affected", "version": "\u003c 22.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:09:51", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28726" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1302155" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-jp9c-vpr3-m5rf", "discovery": "UNKNOWN" }, "title": "File Traversal affecting SVG files on Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41178", "STATE": "PUBLIC", "TITLE": "File Traversal affecting SVG files on Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "20.0.13" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.5" }, { "version_value": "\u003c 22.2.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] }, { "description": [ { "lang": "eng", "value": "CWE-434: Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf" }, { "name": "https://github.com/nextcloud/server/pull/28726", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28726" }, { "name": "https://hackerone.com/reports/1302155", "refsource": "MISC", "url": "https://hackerone.com/reports/1302155" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-jp9c-vpr3-m5rf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41178", "datePublished": "2021-10-25T21:55:11", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41233
Vulnerability from cvelistv5
Published
2022-03-10 20:30
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-26c8-35cm-xq9m | x_refsource_CONFIRM | |
https://github.com/nextcloud/text/pull/1884 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.14 Version: >= 21.0.0, < 21.0.6 Version: >= 22.0.0, < 22.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-26c8-35cm-xq9m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/text/pull/1884" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.14" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.6" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of \"File Drop\". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-10T20:30:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-26c8-35cm-xq9m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/text/pull/1884" } ], "source": { "advisory": "GHSA-26c8-35cm-xq9m", "discovery": "UNKNOWN" }, "title": "Missing authorization in Nextcloud text", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41233", "STATE": "PUBLIC", "TITLE": "Missing authorization in Nextcloud text" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.14" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.6" }, { "version_value": "\u003e= 22.0.0, \u003c 22.2.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of \"File Drop\". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862: Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-26c8-35cm-xq9m", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-26c8-35cm-xq9m" }, { "name": "https://github.com/nextcloud/text/pull/1884", "refsource": "MISC", "url": "https://github.com/nextcloud/text/pull/1884" } ] }, "source": { "advisory": "GHSA-26c8-35cm-xq9m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41233", "datePublished": "2022-03-10T20:30:11", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28847
Vulnerability from cvelistv5
Published
2023-04-25 16:32
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server 24.0.0 prior to 24.0.11 and 25.0.0 prior to 25.0.5; as well as Nextcloud Server Enterprise 23.0.0 prior to 23.0.12.6, 24.0.0 prior to 24.0.11, and 25.0.0 prior to 25.0.5; an attacker is not restricted in verifying passwords of share links so they can just start brute forcing the password. Nextcloud Server 24.0.11 and 25.0.5 and Nextcloud Enterprise Server 23.0.12.6, 24.0.11, and 25.0.5 contain a fix for this issue. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r5wf-xj97-3w7w | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/35057 | x_refsource_MISC | |
https://hackerone.com/reports/1894653 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 23.0.0, < 23.0.12.6 Version: >= 24.0.0, < 24.0.11 Version: >= 25.0.0, < 25.0.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r5wf-xj97-3w7w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r5wf-xj97-3w7w" }, { "name": "https://github.com/nextcloud/server/pull/35057", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/35057" }, { "name": "https://hackerone.com/reports/1894653", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1894653" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": " \u003e= 23.0.0, \u003c 23.0.12.6" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.11" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c 25.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server 24.0.0 prior to 24.0.11 and 25.0.0 prior to 25.0.5; as well as Nextcloud Server Enterprise 23.0.0 prior to 23.0.12.6, 24.0.0 prior to 24.0.11, and 25.0.0 prior to 25.0.5; an attacker is not restricted in verifying passwords of share links so they can just start brute forcing the password. Nextcloud Server 24.0.11 and 25.0.5 and Nextcloud Enterprise Server 23.0.12.6, 24.0.11, and 25.0.5 contain a fix for this issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T16:32:59.897Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r5wf-xj97-3w7w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r5wf-xj97-3w7w" }, { "name": "https://github.com/nextcloud/server/pull/35057", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/35057" }, { "name": "https://hackerone.com/reports/1894653", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1894653" } ], "source": { "advisory": "GHSA-r5wf-xj97-3w7w", "discovery": "UNKNOWN" }, "title": "Nextcloud Server missing brute force protection for passwords of password protected share links" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28847", "datePublished": "2023-04-25T16:32:59.897Z", "dateReserved": "2023-03-24T16:25:34.467Z", "dateUpdated": "2024-08-02T13:51:38.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25820
Vulnerability from cvelistv5
Published
2023-03-22 18:22
Modified
2024-08-02 11:32
Severity ?
EPSS score ?
Summary
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/36489 | x_refsource_MISC | |
https://hackerone.com/reports/1842114 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: Nextcloud Server >= 24.0.0, < 24.0.10 Version: Nextcloud Server >= 25.0.0, < 25.0.4 Version: Nextcloud Enterprise Server >= 25.0.0, < 25.0.4 Version: Nextcloud Enterprise Server >= 24.0.0, < 24.0.10 Version: Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.5 Version: Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.10 Version: Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x" }, { "name": "https://github.com/nextcloud/server/pull/36489", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/36489" }, { "name": "https://hackerone.com/reports/1842114", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1842114" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "Nextcloud Server \u003e= 24.0.0, \u003c 24.0.10" }, { "status": "affected", "version": "Nextcloud Server \u003e= 25.0.0, \u003c 25.0.4" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 25.0.0, \u003c 25.0.4" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 24.0.0, \u003c 24.0.10" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 23.0.0, \u003c 23.0.12.5" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 22.0.0, \u003c 22.2.10.10" }, { "status": "affected", "version": "Nextcloud Enterprise Server \u003e= 21.0.0, \u003c 21.0.9.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-22T18:22:54.139Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x" }, { "name": "https://github.com/nextcloud/server/pull/36489", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/36489" }, { "name": "https://hackerone.com/reports/1842114", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1842114" } ], "source": { "advisory": "GHSA-36g6-wjx2-333x", "discovery": "UNKNOWN" }, "title": "Nextcloud Server and Enterprise Server missing brute force protection on password confirmation modal" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25820", "datePublished": "2023-03-22T18:22:54.139Z", "dateReserved": "2023-02-15T16:34:48.774Z", "dateUpdated": "2024-08-02T11:32:12.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32074
Vulnerability from cvelistv5
Published
2023-05-25 22:59
Modified
2024-08-02 15:03
Severity ?
EPSS score ?
Summary
user_oidc app is an OpenID Connect user backend for Nextcloud. Authentication can be broken/bypassed in user_oidc app. It is recommended that the Nextcloud user_oidc app is upgraded to 1.3.2
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x8mc-84wj-rf34 | x_refsource_CONFIRM | |
https://github.com/nextcloud/user_oidc/pull/615 | x_refsource_MISC | |
https://hackerone.com/reports/1954711 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.3.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:03:29.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x8mc-84wj-rf34", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x8mc-84wj-rf34" }, { "name": "https://github.com/nextcloud/user_oidc/pull/615", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/user_oidc/pull/615" }, { "name": "https://hackerone.com/reports/1954711", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1954711" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.3.2" } ] } ], "descriptions": [ { "lang": "en", "value": "user_oidc app is an OpenID Connect user backend for Nextcloud. Authentication can be broken/bypassed in user_oidc app. It is recommended that the Nextcloud user_oidc app is upgraded to 1.3.2\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-25T22:59:27.860Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x8mc-84wj-rf34", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x8mc-84wj-rf34" }, { "name": "https://github.com/nextcloud/user_oidc/pull/615", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/user_oidc/pull/615" }, { "name": "https://hackerone.com/reports/1954711", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1954711" } ], "source": { "advisory": "GHSA-x8mc-84wj-rf34", "discovery": "UNKNOWN" }, "title": "Nextcloud user_oidc app is missing brute force protection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32074", "datePublished": "2023-05-25T22:59:27.860Z", "dateReserved": "2023-05-01T16:47:35.315Z", "dateUpdated": "2024-08-02T15:03:29.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32676
Vulnerability from cvelistv5
Published
2021-06-16 00:05
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9.0.10, 10.0.8 or 11.2.2. No workarounds for this vulnerability are known to exist.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r | x_refsource_CONFIRM | |
https://hackerone.com/reports/1181962 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 9.0.10 Version: >= 10.0.0, < 10.0.8 Version: >= 11.0.0, < 11.2.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1181962" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 9.0.10" }, { "status": "affected", "version": "\u003e= 10.0.0, \u003c 10.0.8" }, { "status": "affected", "version": "\u003e= 11.0.0, \u003c 11.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9.0.10, 10.0.8 or 11.2.2. No workarounds for this vulnerability are known to exist." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384: Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T00:05:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1181962" } ], "source": { "advisory": "GHSA-p6h7-84v4-827r", "discovery": "UNKNOWN" }, "title": "Session Fixation in Nextcloud Talk", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32676", "STATE": "PUBLIC", "TITLE": "Session Fixation in Nextcloud Talk" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 9.0.10" }, { "version_value": "\u003e= 10.0.0, \u003c 10.0.8" }, { "version_value": "\u003e= 11.0.0, \u003c 11.2.2" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9.0.10, 10.0.8 or 11.2.2. No workarounds for this vulnerability are known to exist." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384: Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r" }, { "name": "https://hackerone.com/reports/1181962", "refsource": "MISC", "url": "https://hackerone.com/reports/1181962" } ] }, "source": { "advisory": "GHSA-p6h7-84v4-827r", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32676", "datePublished": "2021-06-16T00:05:10", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39222
Vulnerability from cvelistv5
Published
2021-11-15 18:30
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g | x_refsource_CONFIRM | |
https://github.com/nextcloud/spreed/pull/542 | x_refsource_MISC | |
https://hackerone.com/reports/1135481 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 10.0.7 Version: >= 10.1.0, < 10.1.4 Version: >= 11.1.0, < 11.1.2 Version: < 11.2.0 Version: >= 12.0.0.alpha-1, < 12.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/spreed/pull/542" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1135481" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 10.0.7" }, { "status": "affected", "version": "\u003e= 10.1.0, \u003c 10.1.4" }, { "status": "affected", "version": "\u003e= 11.1.0, \u003c 11.1.2" }, { "status": "affected", "version": "\u003c 11.2.0" }, { "status": "affected", "version": "\u003e= 12.0.0.alpha-1, \u003c 12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-15T18:30:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/spreed/pull/542" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1135481" } ], "source": { "advisory": "GHSA-xhxq-f4vg-jw5g", "discovery": "UNKNOWN" }, "title": "XSS in Talk", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39222", "STATE": "PUBLIC", "TITLE": "XSS in Talk" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 10.0.7" }, { "version_value": "\u003e= 10.1.0, \u003c 10.1.4" }, { "version_value": "\u003e= 11.1.0, \u003c 11.1.2" }, { "version_value": "\u003c 11.2.0" }, { "version_value": "\u003e= 12.0.0.alpha-1, \u003c 12.0.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434: Unrestricted Upload of File with Dangerous Type" } ] }, { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g" }, { "name": "https://github.com/nextcloud/spreed/pull/542", "refsource": "MISC", "url": "https://github.com/nextcloud/spreed/pull/542" }, { "name": "https://hackerone.com/reports/1135481", "refsource": "MISC", "url": "https://hackerone.com/reports/1135481" } ] }, "source": { "advisory": "GHSA-xhxq-f4vg-jw5g", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39222", "datePublished": "2021-11-15T18:30:13", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24741
Vulnerability from cvelistv5
Published
2022-03-09 21:30
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source, self hosted cloud style services platform. In affected versions an attacker can cause a denial of service by uploading specially crafted files which will cause the server to allocate too much memory / CPU. It is recommended that the Nextcloud Server is upgraded to 21.0.8 , 22.2.4 or 23.0.1. Users unable to upgrade should disable preview generation with the `'enable_previews'` config flag.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/30291 | x_refsource_MISC | |
https://hackerone.com/reports/1261225 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 21.0.8 Version: >= 22.0.0, < 22.2.4 Version: >= 23.0.0, < 23.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/30291" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1261225" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 21.0.8" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.2.4" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted cloud style services platform. In affected versions an attacker can cause a denial of service by uploading specially crafted files which will cause the server to allocate too much memory / CPU. It is recommended that the Nextcloud Server is upgraded to 21.0.8 , 22.2.4 or 23.0.1. Users unable to upgrade should disable preview generation with the `\u0027enable_previews\u0027` config flag." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:08:19", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/30291" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1261225" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-jf3h-xf4q-mh89", "discovery": "UNKNOWN" }, "title": "High memory usage in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24741", "STATE": "PUBLIC", "TITLE": "High memory usage in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 21.0.8" }, { "version_value": "\u003e= 22.0.0, \u003c 22.2.4" }, { "version_value": "\u003e= 23.0.0, \u003c 23.0.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source, self hosted cloud style services platform. In affected versions an attacker can cause a denial of service by uploading specially crafted files which will cause the server to allocate too much memory / CPU. It is recommended that the Nextcloud Server is upgraded to 21.0.8 , 22.2.4 or 23.0.1. Users unable to upgrade should disable preview generation with the `\u0027enable_previews\u0027` config flag." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89" }, { "name": "https://github.com/nextcloud/server/pull/30291", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/30291" }, { "name": "https://hackerone.com/reports/1261225", "refsource": "MISC", "url": "https://hackerone.com/reports/1261225" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-jf3h-xf4q-mh89", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24741", "datePublished": "2022-03-09T21:30:13", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36075
Vulnerability from cvelistv5
Published
2022-09-15 21:50
Modified
2024-08-03 09:52
Severity ?
EPSS score ?
Summary
Nextcloud files access control is a nextcloud app to manage access control for files. Users with limited access can see file names in certain cases where they do not have privilege to do so. This issue has been addressed and it is recommended that the Nextcloud Files Access Control app is upgraded to 1.12.2, 1.13.1 or 1.14.1. There are no known workarounds for this issue
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4m73-g7v7-v62w | x_refsource_CONFIRM | |
https://github.com/nextcloud/files_accesscontrol/pull/248 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 1.12.2 Version: >= 1.13.0, < 1.13.1 Version: >= 1.14.0, < 1.14.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:52:00.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4m73-g7v7-v62w" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/files_accesscontrol/pull/248" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 1.12.2" }, { "status": "affected", "version": "\u003e= 1.13.0, \u003c 1.13.1" }, { "status": "affected", "version": "\u003e= 1.14.0, \u003c 1.14.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud files access control is a nextcloud app to manage access control for files. Users with limited access can see file names in certain cases where they do not have privilege to do so. This issue has been addressed and it is recommended that the Nextcloud Files Access Control app is upgraded to 1.12.2, 1.13.1 or 1.14.1. There are no known workarounds for this issue" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-15T21:50:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4m73-g7v7-v62w" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/files_accesscontrol/pull/248" } ], "source": { "advisory": "GHSA-4m73-g7v7-v62w", "discovery": "UNKNOWN" }, "title": "File list exposure in Nextcloud Files Access Control", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-36075", "STATE": "PUBLIC", "TITLE": "File list exposure in Nextcloud Files Access Control" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 1.12.2" }, { "version_value": "\u003e= 1.13.0, \u003c 1.13.1" }, { "version_value": "\u003e= 1.14.0, \u003c 1.14.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud files access control is a nextcloud app to manage access control for files. Users with limited access can see file names in certain cases where they do not have privilege to do so. This issue has been addressed and it is recommended that the Nextcloud Files Access Control app is upgraded to 1.12.2, 1.13.1 or 1.14.1. There are no known workarounds for this issue" } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4m73-g7v7-v62w", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4m73-g7v7-v62w" }, { "name": "https://github.com/nextcloud/files_accesscontrol/pull/248", "refsource": "MISC", "url": "https://github.com/nextcloud/files_accesscontrol/pull/248" } ] }, "source": { "advisory": "GHSA-4m73-g7v7-v62w", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36075", "datePublished": "2022-09-15T21:50:10", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:52:00.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37315
Vulnerability from cvelistv5
Published
2024-06-14 15:08
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
Nextcloud Server is a self hosted personal cloud system. An attacker with read-only access to a file is able to restore older versions of a document when the files_versions app is enabled. It is recommended that the Nextcloud Server is upgraded to 26.0.12, 27.1.7 or 28.0.3 and that the Nextcloud Enterprise Server is upgraded to 23.0.12.16, 24.0.12.12, 25.0.13.6, 26.0.12, 27.1.7 or 28.0.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/43727 | x_refsource_MISC | |
https://hackerone.com/reports/1356508 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 26.0.0, < 26.0.12 Version: >= 27.0.0, < 27.1.7 Version: >= 28.0.0, < 28.0.3 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37315", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-17T15:13:13.784957Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-17T15:13:32.772Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:55.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942" }, { "name": "https://github.com/nextcloud/server/pull/43727", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/43727" }, { "name": "https://hackerone.com/reports/1356508", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1356508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 26.0.0, \u003c 26.0.12" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c 27.1.7" }, { "status": "affected", "version": "\u003e= 28.0.0, \u003c 28.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Server is a self hosted personal cloud system. An attacker with read-only access to a file is able to restore older versions of a document when the files_versions app is enabled. It is recommended that the Nextcloud Server is upgraded to 26.0.12, 27.1.7 or 28.0.3 and that the Nextcloud Enterprise Server is upgraded to 23.0.12.16, 24.0.12.12, 25.0.13.6, 26.0.12, 27.1.7 or 28.0.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:08:54.357Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942" }, { "name": "https://github.com/nextcloud/server/pull/43727", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/43727" }, { "name": "https://hackerone.com/reports/1356508", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1356508" } ], "source": { "advisory": "GHSA-5mq8-738w-5942", "discovery": "UNKNOWN" }, "title": "Nextcloud Server\u0027s read-only users can restore old versions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37315", "datePublished": "2024-06-14T15:08:54.357Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:55.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23943
Vulnerability from cvelistv5
Published
2023-02-06 20:18
Modified
2024-08-02 10:49
Severity ?
EPSS score ?
Summary
Nextcloud mail is an email app for the nextcloud home server platform. In affected versions the SMTP, IMAP and Sieve host fields allowed to scan for internal services and servers reachable from within the local network of the Nextcloud Server. It is recommended that the Nextcloud Maill app is upgraded to 1.15.0 or 2.2.2. The only known workaround for this issue is to completely disable the nextcloud mail app.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6 | x_refsource_CONFIRM | |
https://github.com/nextcloud/mail/pull/7796 | x_refsource_MISC | |
https://hackerone.com/reports/1736390 | x_refsource_MISC | |
https://hackerone.com/reports/1741525 | x_refsource_MISC | |
https://hackerone.com/reports/1746582 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 2.0.0, < 2.2.2 Version: < 1.15.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:49:08.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6" }, { "name": "https://github.com/nextcloud/mail/pull/7796", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/mail/pull/7796" }, { "name": "https://hackerone.com/reports/1736390", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1736390" }, { "name": "https://hackerone.com/reports/1741525", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1741525" }, { "name": "https://hackerone.com/reports/1746582", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1746582" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.2" }, { "status": "affected", "version": "\u003c 1.15.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud mail is an email app for the nextcloud home server platform. In affected versions the SMTP, IMAP and Sieve host fields allowed to scan for internal services and servers reachable from within the local network of the Nextcloud Server. It is recommended that the Nextcloud Maill app is upgraded to 1.15.0 or 2.2.2. The only known workaround for this issue is to completely disable the nextcloud mail app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-06T20:18:33.641Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gcx-r739-9pf6" }, { "name": "https://github.com/nextcloud/mail/pull/7796", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/mail/pull/7796" }, { "name": "https://hackerone.com/reports/1736390", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1736390" }, { "name": "https://hackerone.com/reports/1741525", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1741525" }, { "name": "https://hackerone.com/reports/1746582", "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1746582" } ], "source": { "advisory": "GHSA-8gcx-r739-9pf6", "discovery": "UNKNOWN" }, "title": "Blind SSRF via server URL input in the Nextcloud Mail app" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23943", "datePublished": "2023-02-06T20:18:33.641Z", "dateReserved": "2023-01-19T21:12:31.362Z", "dateUpdated": "2024-08-02T10:49:08.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41239
Vulnerability from cvelistv5
Published
2022-03-08 18:05
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/issues/27122 | x_refsource_MISC | |
https://github.com/nextcloud/server/pull/29260 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202208-17 | vendor-advisory, x_refsource_GENTOO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 20.0.14 Version: >= 21.0.0, < 21.0.6 Version: >= 22.2.0, < 22.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/issues/27122" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/29260" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.14" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.6" }, { "status": "affected", "version": "\u003e= 22.2.0, \u003c 22.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:07:18", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/issues/27122" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/29260" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-g722-cm3h-8wrx", "discovery": "UNKNOWN" }, "title": "User enumeration setting not respected in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41239", "STATE": "PUBLIC", "TITLE": "User enumeration setting not respected in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.14" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.6" }, { "version_value": "\u003e= 22.2.0, \u003c 22.2.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx" }, { "name": "https://github.com/nextcloud/server/issues/27122", "refsource": "MISC", "url": "https://github.com/nextcloud/server/issues/27122" }, { "name": "https://github.com/nextcloud/server/pull/29260", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/29260" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-g722-cm3h-8wrx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41239", "datePublished": "2022-03-08T18:05:12", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39346
Vulnerability from cvelistv5
Published
2022-11-25 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 22.2.10 Version: >= 23.0.0, < 23.0.7 Version: >= 24.0.0, < 24.0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/33052" }, { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/1588562" }, { "name": "FEDORA-2022-902df3b060", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TARDPRPBTI5TJRBYRVVQGTL6KWRCV5/" }, { "name": "FEDORA-2022-49b20342c0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAER4DCCHHSUDFHQ6LTIH4JEJFF73IU/" }, { "name": "FEDORA-2022-98c1d712b5", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R32L3P53AQKQQC652LA5U3AWFTZKPDK3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 22.2.10" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.7" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6" }, { "url": "https://github.com/nextcloud/server/pull/33052" }, { "url": "https://hackerone.com/reports/1588562" }, { "name": "FEDORA-2022-902df3b060", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TARDPRPBTI5TJRBYRVVQGTL6KWRCV5/" }, { "name": "FEDORA-2022-49b20342c0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAER4DCCHHSUDFHQ6LTIH4JEJFF73IU/" }, { "name": "FEDORA-2022-98c1d712b5", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R32L3P53AQKQQC652LA5U3AWFTZKPDK3/" } ], "source": { "advisory": "GHSA-6w9f-jgjx-4vj6", "discovery": "UNKNOWN" }, "title": "Missing length validation of user displayname in nextcloud server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39346", "datePublished": "2022-11-25T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28646
Vulnerability from cvelistv5
Published
2023-03-30 18:16
Modified
2024-08-02 13:43
Severity ?
EPSS score ?
Summary
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/pull/11242 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: >= 3.7.0, < 3.24.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:23.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v" }, { "name": "https://github.com/nextcloud/android/pull/11242", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/pull/11242" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003e= 3.7.0, \u003c 3.24.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-30T18:16:18.917Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v" }, { "name": "https://github.com/nextcloud/android/pull/11242", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/pull/11242" } ], "source": { "advisory": "GHSA-c3rf-94h6-vj8v", "discovery": "UNKNOWN" }, "title": "App lockout in nextcloud Android app can be bypassed via thirdparty apps" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28646", "datePublished": "2023-03-30T18:16:18.917Z", "dateReserved": "2023-03-20T12:19:47.209Z", "dateUpdated": "2024-08-02T13:43:23.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32658
Vulnerability from cvelistv5
Published
2021-06-08 18:35
Modified
2024-08-03 23:25
Severity ?
EPSS score ?
Summary
Nextcloud Android is the Android client for the Nextcloud open source home cloud system. Due to a timeout issue the Android client may not properly clean all sensitive data on account removal. This could include sensitive key material such as the End-to-End encryption keys. It is recommended that the Nextcloud Android App is upgraded to 3.16.1
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g5gf-rmhm-wpxw | x_refsource_CONFIRM | |
https://github.com/nextcloud/android/commit/355f3c745b464b741b20a3b96597303490c26333 | x_refsource_MISC | |
https://hackerone.com/reports/1189168 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 3.16.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:25:31.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g5gf-rmhm-wpxw" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/android/commit/355f3c745b464b741b20a3b96597303490c26333" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1189168" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 3.16.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud Android is the Android client for the Nextcloud open source home cloud system. Due to a timeout issue the Android client may not properly clean all sensitive data on account removal. This could include sensitive key material such as the End-to-End encryption keys. It is recommended that the Nextcloud Android App is upgraded to 3.16.1" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-08T18:35:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g5gf-rmhm-wpxw" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/android/commit/355f3c745b464b741b20a3b96597303490c26333" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1189168" } ], "source": { "advisory": "GHSA-g5gf-rmhm-wpxw", "discovery": "UNKNOWN" }, "title": "Sensitive data may not be removed from storage on account removal", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32658", "STATE": "PUBLIC", "TITLE": "Sensitive data may not be removed from storage on account removal" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 3.16.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud Android is the Android client for the Nextcloud open source home cloud system. Due to a timeout issue the Android client may not properly clean all sensitive data on account removal. This could include sensitive key material such as the End-to-End encryption keys. It is recommended that the Nextcloud Android App is upgraded to 3.16.1" } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g5gf-rmhm-wpxw", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g5gf-rmhm-wpxw" }, { "name": "https://github.com/nextcloud/android/commit/355f3c745b464b741b20a3b96597303490c26333", "refsource": "MISC", "url": "https://github.com/nextcloud/android/commit/355f3c745b464b741b20a3b96597303490c26333" }, { "name": "https://hackerone.com/reports/1189168", "refsource": "MISC", "url": "https://hackerone.com/reports/1189168" } ] }, "source": { "advisory": "GHSA-g5gf-rmhm-wpxw", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32658", "datePublished": "2021-06-08T18:35:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:25:31.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31014
Vulnerability from cvelistv5
Published
2022-07-05 17:15
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. It is recommended that the Nextcloud Server is upgraded to 22.2.8 , 23.0.5 or 24.0.1. There are no known workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2 | x_refsource_CONFIRM | |
https://github.com/nextcloud/server/pull/32428 | x_refsource_MISC | |
https://hackerone.com/reports/1516377 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | nextcloud | security-advisories |
Version: < 22.2.8 Version: >= 23.0.0, < 23.0.5 Version: >= 24.0.0, < 24.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/32428" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1516377" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 22.2.8" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c 23.0.5" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c 24.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. It is recommended that the Nextcloud Server is upgraded to 22.2.8 , 23.0.5 or 24.0.1. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-93", "description": "CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-05T17:15:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/32428" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1516377" } ], "source": { "advisory": "GHSA-264h-3v4w-6xh2", "discovery": "UNKNOWN" }, "title": "SMTP Command Injection in iCalendar Attachments to emails via newlines in Nextcloud Server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31014", "STATE": "PUBLIC", "TITLE": "SMTP Command Injection in iCalendar Attachments to emails via newlines in Nextcloud Server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 22.2.8" }, { "version_value": "\u003e= 23.0.0, \u003c 23.0.5" }, { "version_value": "\u003e= 24.0.0, \u003c 24.0.1" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. It is recommended that the Nextcloud Server is upgraded to 22.2.8 , 23.0.5 or 24.0.1. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2" }, { "name": "https://github.com/nextcloud/server/pull/32428", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/32428" }, { "name": "https://hackerone.com/reports/1516377", "refsource": "MISC", "url": "https://hackerone.com/reports/1516377" } ] }, "source": { "advisory": "GHSA-264h-3v4w-6xh2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31014", "datePublished": "2022-07-05T17:15:12", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }