Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2.
History

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 16:45:00 +0000

Type Values Removed Values Added
Description Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2.
Title Nextcloud Server Custom defined credentials of external storages are sent back to the frontend
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-15T16:35:39.424Z

Updated: 2024-11-15T17:06:22.449Z

Reserved: 2024-11-11T18:49:23.560Z

Link: CVE-2024-52523

cve-icon Vulnrichment

Updated: 2024-11-15T17:06:16.306Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-15T17:15:22.870

Modified: 2024-11-18T17:11:56.587

Link: CVE-2024-52523

cve-icon Redhat

No data.