CVE-2022-29159 – Possibility for anyone to add a stack with existing tasks on anyone's board in Nextcloud Deck
https://notcve.org/view.php?id=CVE-2022-29159
Nextcloud Deck is a Kanban-style project & personal management tool for Nextcloud. In versions prior to 1.4.8, 1.5.6, and 1.6.1, an authenticated user can move stacks with cards from their own board to a board of another user. The Nextcloud Deck app contains a patch for this issue in versions 1.4.8, 1.5.6, and 1.6.1. There are no known currently-known workarounds available. Nextcloud Deck es una herramienta de administración personal y de proyectos de estilo Kanban para Nextcloud. • https://github.com/nextcloud/deck/pull/3541 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqhf-673w-7r3j https://hackerone.com/reports/1450117 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2021-39225 – Missing permission check on Deck API
https://notcve.org/view.php?id=CVE-2021-39225
Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading. Nextcloud es una plataforma de productividad de código abierto y auto-alojada. • https://github.com/nextcloud/deck/pull/3316 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72 https://hackerone.com/reports/1331728 • CWE-639: Authorization Bypass Through User-Controlled Key CWE-862: Missing Authorization •
CVE-2021-37631 – Circle can be accessed by non-Circle members in Nextcloud Deck
https://notcve.org/view.php?id=CVE-2021-37631
Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin. • https://github.com/nextcloud/deck/pull/3217 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr https://hackerone.com/reports/1256021 https://hackerone.com/reports/1280931 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2021-22913
https://notcve.org/view.php?id=CVE-2021-22913
Nextcloud Deck before 1.2.7, 1.4.1 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only the local Nextcloud server unless a global search has been explicitly chosen by the user. Nextcloud Deck versiones anteriores a 1.2.7, 1.4.1, sufre una vulnerabilidad de divulgación de información cuando las búsquedas de compartidos utilizan el servidor de búsqueda por defecto en lugar de sólo el servidor local de Nextcloud a menos que una búsqueda global haya sido elegida explícitamente por el usuario • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h8f6-wg82-6p7r https://hackerone.com/reports/1167958 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2020-8297
https://notcve.org/view.php?id=CVE-2020-8297
Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user. Nextcloud Deck anterior a 1.0.2 sufre de una vulnerabilidad de Referencia Directa a Objeto No Segura (IDOR) que permite a los usuarios con un identificador de usuario duplicado acceder a los datos de la plataforma de un usuario eliminado anteriormente • https://github.com/nextcloud/deck/pull/1976 https://hackerone.com/reports/882258 https://nextcloud.com/security/advisory/?id=NC-SA-2021-007 • CWE-639: Authorization Bypass Through User-Controlled Key •