
CVE-2024-52517 – Nextcloud Server's global credentials of external storages are sent back to the frontend
https://notcve.org/view.php?id=CVE-2024-52517
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-52518 – Nextcloud Server is missing password confirmation when changing external storage options
https://notcve.org/view.php?id=CVE-2024-52518
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg • CWE-287: Improper Authentication •

CVE-2024-52519 – Nextcloud Server's OAuth2 client secrets were stored in a recoverable way
https://notcve.org/view.php?id=CVE-2024-52519
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2 • CWE-922: Insecure Storage of Sensitive Information •

CVE-2024-52520 – Nextcloud Server's link reference provider can be tricked into downloading bigger files than intended
https://notcve.org/view.php?id=CVE-2024-52520
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxqf-cfxw-mqmj • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-400: Uncontrolled Resource Consumption •

CVE-2024-52521 – Nextcloud Server has a potential hash collision for background jobs could skip queuing them
https://notcve.org/view.php?id=CVE-2024-52521
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4 • CWE-328: Use of Weak Hash •

CVE-2024-52523 – Nextcloud Server Custom defined credentials of external storages are sent back to the frontend
https://notcve.org/view.php?id=CVE-2024-52523
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-42w6-r45m-9w9j • CWE-125: Out-of-bounds Read CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2024-52525 – Nextcloud Server User password is available in memory of the PHP process
https://notcve.org/view.php?id=CVE-2024-52525
15 Nov 2024 — Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2024-46958
https://notcve.org/view.php?id=CVE-2024-46958
16 Sep 2024 — In Nextcloud Desktop Client 3.13.1 through 3.13.3 on Linux, synchronized files (between the server and client) may become world writable or world readable. This is fixed in 3.13.4. • https://github.com/nextcloud/desktop/compare/v3.13.3...v3.13.4 •

CVE-2024-37887 – Nextcloud Server's events information leaked with shared calendars on recurrence exceptions
https://notcve.org/view.php?id=CVE-2024-37887
14 Jun 2024 — Nextcloud Server is a self hosted personal cloud system. Private shared calendar events' recurrence exceptions can be read by sharees. It is recommended that the Nextcloud Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1 and that the Nextcloud Enterprise Server is upgraded to 27.1.10 or 28.0.6 or 29.0.1. Nextcloud Server es un sistema de nube personal autohospedado. Los participantes pueden leer las excepciones de recurrencia de los eventos privados del calendario compartido. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595 • CWE-284: Improper Access Control •

CVE-2024-37886 – Nextcloud user_oidc's ID4me does not validate signature or expiration
https://notcve.org/view.php?id=CVE-2024-37886
14 Jun 2024 — user_oidc app is an OpenID Connect user backend for Nextcloud. An attacker could potentially trick the app into accepting a request that is not signed by the correct server. It is recommended that the Nextcloud user_oidc app is upgraded to 1.3.5, 2.0.0, 3.0.0, 4.0.0 or 5.0.0. La aplicación user_oidc es un backend de usuario de OpenID Connect para Nextcloud. Un atacante podría engañar a la aplicación para que acepte una solicitud que no esté firmada por el servidor correcto. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw5h-29xf-g55g • CWE-347: Improper Verification of Cryptographic Signature •