Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 15 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. | |
Title | Nextcloud Server's global credentials of external storages are sent back to the frontend | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-15T16:49:40.993Z
Updated: 2024-11-15T17:32:03.847Z
Reserved: 2024-11-11T18:49:23.559Z
Link: CVE-2024-52517
Vulnrichment
Updated: 2024-11-15T17:31:48.474Z
NVD
Status : Awaiting Analysis
Published: 2024-11-15T17:15:21.297
Modified: 2024-11-18T17:11:56.587
Link: CVE-2024-52517
Redhat
No data.