Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nextcloud
Nextcloud nextcloud Server |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:* cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:* |
|
Vendors & Products |
Nextcloud
Nextcloud nextcloud Server |
Fri, 15 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 15 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. | |
Title | Nextcloud Server's global credentials of external storages are sent back to the frontend | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-15T17:32:03.847Z
Reserved: 2024-11-11T18:49:23.559Z
Link: CVE-2024-52517

Updated: 2024-11-15T17:31:48.474Z

Status : Analyzed
Published: 2024-11-15T17:15:21.297
Modified: 2025-01-06T20:58:07.123
Link: CVE-2024-52517

No data.