CVE-2021-39225 – Missing permission check on Deck API
https://notcve.org/view.php?id=CVE-2021-39225
Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading. Nextcloud es una plataforma de productividad de código abierto y auto-alojada. • https://github.com/nextcloud/deck/pull/3316 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2x96-38qg-3m72 https://hackerone.com/reports/1331728 • CWE-639: Authorization Bypass Through User-Controlled Key CWE-862: Missing Authorization •
CVE-2021-37631 – Circle can be accessed by non-Circle members in Nextcloud Deck
https://notcve.org/view.php?id=CVE-2021-37631
Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin. • https://github.com/nextcloud/deck/pull/3217 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4mxp-j277-82hr https://hackerone.com/reports/1256021 https://hackerone.com/reports/1280931 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2021-22913
https://notcve.org/view.php?id=CVE-2021-22913
Nextcloud Deck before 1.2.7, 1.4.1 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only the local Nextcloud server unless a global search has been explicitly chosen by the user. Nextcloud Deck versiones anteriores a 1.2.7, 1.4.1, sufre una vulnerabilidad de divulgación de información cuando las búsquedas de compartidos utilizan el servidor de búsqueda por defecto en lugar de sólo el servidor local de Nextcloud a menos que una búsqueda global haya sido elegida explícitamente por el usuario • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h8f6-wg82-6p7r https://hackerone.com/reports/1167958 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2020-8297
https://notcve.org/view.php?id=CVE-2020-8297
Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user. Nextcloud Deck anterior a 1.0.2 sufre de una vulnerabilidad de Referencia Directa a Objeto No Segura (IDOR) que permite a los usuarios con un identificador de usuario duplicado acceder a los datos de la plataforma de un usuario eliminado anteriormente • https://github.com/nextcloud/deck/pull/1976 https://hackerone.com/reports/882258 https://nextcloud.com/security/advisory/?id=NC-SA-2021-007 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2020-8182
https://notcve.org/view.php?id=CVE-2020-8182
Improper access control in Nextcloud Deck 0.8.0 allowed an attacker to reshare boards shared with them with more permissions than they had themselves. Un control de acceso inapropiado en Nextcloud Deck versión 0.8.0, permitió a un atacante volver a compartir tableros compartidos con estos con más permisos de los que ellos mismos tenían • https://hackerone.com/reports/827816 https://nextcloud.com/security/advisory/?id=NC-SA-2020-025 • CWE-281: Improper Preservation of Permissions CWE-284: Improper Access Control •