Home

Description

Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.

PUBLISHED Reserved 2024-11-11 | Published 2024-11-15 | Updated 2024-11-15 | Assigner GitHub_M




LOW: 2.6CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

>= 28.0.0, < 28.0.11
affected

>= 29.0.0, < 29.0.8
affected

>= 30.0.0, < 30.0.1
affected

References

github.com/...sories/security/advisories/GHSA-gxph-5m4j-pfmj

github.com/nextcloud/text/pull/6485

github.com/...ommit/ca24b25c93b81626b4e457c260243edeab5f1548

hackerone.com/reports/2376900

cve.org (CVE-2024-52513)

nvd.nist.gov (CVE-2024-52513)

Download JSON