Page 2 of 11 results (0.005 seconds)

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading. Nextcloud es una plataforma de productividad de código abierto y auto-alojada. • https://github.com/nextcloud/deck/pull/3316 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72 https://hackerone.com/reports/1331728 • CWE-639: Authorization Bypass Through User-Controlled Key CWE-862: Missing Authorization •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin. • https://github.com/nextcloud/deck/pull/3217 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr https://hackerone.com/reports/1256021 https://hackerone.com/reports/1280931 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Deck before 1.2.7, 1.4.1 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only the local Nextcloud server unless a global search has been explicitly chosen by the user. Nextcloud Deck versiones anteriores a 1.2.7, 1.4.1, sufre una vulnerabilidad de divulgación de información cuando las búsquedas de compartidos utilizan el servidor de búsqueda por defecto en lugar de sólo el servidor local de Nextcloud a menos que una búsqueda global haya sido elegida explícitamente por el usuario • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h8f6-wg82-6p7r https://hackerone.com/reports/1167958 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user. Nextcloud Deck anterior a 1.0.2 sufre de una vulnerabilidad de Referencia Directa a Objeto No Segura (IDOR) que permite a los usuarios con un identificador de usuario duplicado acceder a los datos de la plataforma de un usuario eliminado anteriormente • https://github.com/nextcloud/deck/pull/1976 https://hackerone.com/reports/882258 https://nextcloud.com/security/advisory/?id=NC-SA-2021-007 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 4.1EPSS: 0%CPEs: 1EXPL: 0

Improper access control in Nextcloud Deck 1.0.0 allowed an attacker to inject tasks into other users decks. Un Control de Acceso Incorrecto en Nextcloud Deck versión 1.0.0, permitió a un atacante inyectar tareas en las cubiertas de otros usuarios • https://hackerone.com/reports/867052 https://nextcloud.com/security/advisory/?id=NC-SA-2020-022 • CWE-269: Improper Privilege Management CWE-284: Improper Access Control •