Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nextcloud
Nextcloud nextcloud Server |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:* cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:* |
|
Vendors & Products |
Nextcloud
Nextcloud nextcloud Server |
Fri, 15 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 15 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0. | |
Title | Nextcloud Server has a potential hash collision for background jobs could skip queuing them | |
Weaknesses | CWE-328 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-15T17:04:24.129Z
Reserved: 2024-11-11T18:49:23.559Z
Link: CVE-2024-52521

Updated: 2024-11-15T17:04:19.657Z

Status : Analyzed
Published: 2024-11-15T17:15:22.580
Modified: 2025-01-23T14:52:33.387
Link: CVE-2024-52521

No data.