15 results (0.015 seconds)

CVSS: 2.6EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548 https://github.com/nextcloud/text/pull/6485 https://hackerone.com/reports/2376900 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.1EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g8pr-g25r-58xj https://github.com/nextcloud/server/commit/5fffbcfe8650eab75b00e8d188fbc95b0e43f3a8 https://github.com/nextcloud/server/pull/44889 https://hackerone.com/reports/2447316 • CWE-284: Improper Access Control •

CVSS: 5.7EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5m5g-hw8c-2236 https://github.com/nextcloud/server/commit/7e1c30f82a63fbea8c269e0eec38291377f32604 https://github.com/nextcloud/server/pull/45340 https://hackerone.com/reports/2484499 • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVSS: 3.0EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34 https://github.com/nextcloud/server/pull/47180 • CWE-269: Improper Privilege Management •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg https://github.com/nextcloud/server/commit/c45ed55f959ff54f3ea23dd2ae1a5868a075c9fe https://github.com/nextcloud/server/pull/48359 https://hackerone.com/reports/2554079 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •