CVE-2023-39957 – Path traversal allows tricking the Talk Android app into writing files into it's root directory
https://notcve.org/view.php?id=CVE-2023-39957
Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available. Nextcloud Talk Android permite a los usuarios realizar llamadas de vídeo y audio a través de Nextcloud en Android. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj https://github.com/nextcloud/talk-android/pull/3064 https://hackerone.com/reports/1997029 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2023-22473 – Passcode bypass on Talk-Android app
https://notcve.org/view.php?id=CVE-2023-22473
Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx https://github.com/nextcloud/talk-android/pull/2598 https://hackerone.com/reports/1784645 • CWE-284: Improper Access Control •
CVE-2022-41926 – Nextcloud Talk Android broadcast incorrect permission handling
https://notcve.org/view.php?id=CVE-2022-41926
Nextcould talk android is the android OS implementation of the nextcloud talk chat system. In affected versions the receiver is not protected by broadcastPermission allowing malicious apps to monitor communication. It is recommended that the Nextcloud Talk Android is upgraded to 14.1.0. There are no known workarounds for this issue. Nextcould talk android es la implementación del sistema operativo Android del sistema de chat nextcloud talk. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-564v-3rfc-352m https://github.com/nextcloud/talk-android/pull/2148 https://hackerone.com/reports/1596459 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2022-39212 – Last video frame is still sent after video is disabled in a call in Nextcloud Talk
https://notcve.org/view.php?id=CVE-2022-39212
Nextcloud Talk is an open source chat, video & audio calls client for the Nextcloud platform. In affected versions an attacker could see the last video frame of any participant who has video disabled but a camera selected. It is recommended that the Nextcloud Talk app is upgraded to 13.0.8 or 14.0.4. Users unable to upgrade should select "None" as camera before joining the call. Nextcloud Talk es un cliente de código abierto de chat, vídeo y llamadas de audio para la plataforma Nextcloud. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv https://github.com/nextcloud/spreed/pull/7673 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-35932 – Missing rate limit when trying to join a password protected Nextcloud Talk conversation
https://notcve.org/view.php?id=CVE-2022-35932
Nextcloud Talk is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.7, 13.0.7, and 14.0.3, password protected conversations are susceptible to brute force attacks if the attacker has the link/conversation token. It is recommended that the Nextcloud Talk application is upgraded to 12.2.7, 13.0.7 or 14.0.3. There are currently no known workarounds available apart from not having password protected conversations. Nextcloud Talk es una aplicación de videoconferencia y audioconferencia para Nextcloud. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pf36-jvpv-4hwq https://github.com/nextcloud/spreed/commit/04300bbed0e87ff3420b5d752bbc48e2c15f35e9 https://github.com/nextcloud/spreed/commit/10341b9fe59a44ae0d139c072abd6b5026f33771 https://github.com/nextcloud/spreed/commit/f5ac73940f9f683b11e518d1c54150bf50dab9be https://github.com/nextcloud/spreed/pull/7504 https://github.com/nextcloud/spreed/pull/7535 https://github.com/nextcloud/spreed/pull/7536 https://github.com/nextcloud/spreed/pull/7537 https:/ • CWE-307: Improper Restriction of Excessive Authentication Attempts CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •