
CVE-2024-30247 – Command Injection as root in NextCloudPi web panel
https://notcve.org/view.php?id=CVE-2024-30247
29 Mar 2024 — NextcloudPi is a ready to use image for Virtual Machines, Raspberry Pi, Odroid HC1, Rock64 and other boards. A command injection vulnerability in NextCloudPi allows command execution as the root user via the NextCloudPi web-panel. Due to a security misconfiguration this can be used by anyone with access to NextCloudPi web-panel, no authentication is required. It is recommended that the NextCloudPi is upgraded to 1.53.1. NextcloudPi es una imagen lista para usar para Máquinas Virtuales, Raspberry Pi, Odroid ... • https://github.com/nextcloud/nextcloudpi/security/advisories/GHSA-m597-72v7-j982 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-22402 – Improper handling of request URLs in Nextcloud Guests app allows guest users to bypass app allowlist
https://notcve.org/view.php?id=CVE-2024-22402
18 Jan 2024 — Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users were able to load the first page of apps they were actually not allowed to access. Depending on the selection of apps installed this may present a permissions bypass. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability. • https://github.com/nextcloud/guests/pull/1082 • CWE-281: Improper Preservation of Permissions •

CVE-2024-22401 – All users can reset the allowed apps list for Nextcloud Guest App users
https://notcve.org/view.php?id=CVE-2024-22401
18 Jan 2024 — Nextcloud guests app is a utility to create guest users which can only see files shared with them. In affected versions users could change the allowed list of apps, allowing them to use apps that were not intended to be used. It is recommended that the Guests app is upgraded to 2.4.1, 2.5.1 or 3.0.1. There are no known workarounds for this vulnerability. La aplicación para invitados Nextcloud es una utilidad para crear usuarios invitados que solo pueden ver los archivos compartidos con ellos. • https://github.com/nextcloud/guests/pull/1082 • CWE-281: Improper Preservation of Permissions •

CVE-2024-22404 – Permissions bypass in Nextcloud with the files zip app
https://notcve.org/view.php?id=CVE-2024-22404
18 Jan 2024 — Nextcloud files Zip app is a tool to create zip archives from one or multiple files from within Nextcloud. In affected versions users can download "view-only" files by zipping the complete folder. It is recommended that the Files ZIP app is upgraded to 1.2.1, 1.4.1, or 1.5.0. Users unable to upgrade should disable the file zip app. La aplicación Nextcloud files Zip es una herramienta para crear archivos zip a partir de uno o varios archivos desde Nextcloud. • https://github.com/nextcloud/files_zip/commit/43204539d517a13e945b90652718e2a213f46820 • CWE-281: Improper Preservation of Permissions •

CVE-2024-22403 – OAuth2 authorization codes are valid indefinetly in Nextcloud server
https://notcve.org/view.php?id=CVE-2024-22403
18 Jan 2024 — Nextcloud server is a self hosted personal cloud system. In affected versions OAuth codes did not expire. When an attacker would get access to an authorization code they could authenticate at any time using the code. As of version 28.0.0 OAuth codes are invalidated after 10 minutes and will no longer be authenticated. To exploit this vulnerability an attacker would need to intercept an OAuth code from a user session. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wppc-f5g8-vx36 • CWE-613: Insufficient Session Expiration •

CVE-2024-22400 – Open redirect in user_saml via RelayState parameter in Nextcloud User Saml
https://notcve.org/view.php?id=CVE-2024-22400
18 Jan 2024 — Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue. Nextcloud User Saml es una aplicación para autenticar a los usuarios de Nextcloud mediante SAML. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2024-22213 – Cross-site Scripting when sending HTML as a comment in the Nextcloud Deck app
https://notcve.org/view.php?id=CVE-2024-22213
18 Jan 2024 — Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions users could be tricked into executing malicious code that would execute in their browser via HTML sent as a comment. It is recommended that the Nextcloud Deck is upgraded to version 1.9.5 or 1.11.2. There are no known workarounds for this vulnerability. Deck es una herramienta de organización estilo kanban destinada a la planificación personal y organización ... • https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-22212 – Nextcloud global site selector authentication bypass
https://notcve.org/view.php?id=CVE-2024-22212
18 Jan 2024 — Nextcloud Global Site Selector is a tool which allows you to run multiple small Nextcloud instances and redirect users to the right server. A problem in the password verification method allows an attacker to authenticate as another user. It is recommended that the Nextcloud Global Site Selector is upgraded to version 1.4.1, 2.1.2, 2.3.4 or 2.4.5. There are no known workarounds for this issue. Nextcloud Global Site Selector es una herramienta que le permite ejecutar múltiples instancias pequeñas de Nextcloud... • https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee • CWE-306: Missing Authentication for Critical Function •

CVE-2023-49792 – Bruteforce protection can be bypassed with misconfigured proxy
https://notcve.org/view.php?id=CVE-2023-49792
22 Dec 2023 — Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Ent... • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVE-2023-49791 – Workflows do not require password confirmation on API level
https://notcve.org/view.php?id=CVE-2023-49791
22 Dec 2023 — Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and ... • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr • CWE-284: Improper Access Control CWE-287: Improper Authentication •