// For flags

CVE-2020-8118

openSUSE Security Advisory - openSUSE-SU-2020:0229-1

Severity Score

5.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.

Un ataque de tipo server-side request forgery autenticado en Nextcloud versión 16.0.1, permitió detectar servicios locales y remotos al agregar una nueva suscripción en la aplicación calendar.

An update that fixes 6 vulnerabilities is now available. This update for nextcloud fixes the following issues. Nextcloud was updated to 15.0.14. On the file extension when checking file mimetypes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled admins to create users with IDs of system folders previews and files when a file-drop share link is opened via the gallery app forgery allowed to detect local and remote services when adding a new subscription in the calendar application sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link nextcloud was updated to 13.0.12. This update was imported from the openSUSE:Leap:15.1:Update update project.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-28 CVE Reserved
  • 2020-02-04 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2025-07-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nextcloud
Search vendor "Nextcloud"
Nextcloud Server
Search vendor "Nextcloud" for product "Nextcloud Server"
< 15.0.9
Search vendor "Nextcloud" for product "Nextcloud Server" and version " < 15.0.9"
-
Affected
Nextcloud
Search vendor "Nextcloud"
Nextcloud Server
Search vendor "Nextcloud" for product "Nextcloud Server"
>= 16.0.0 < 16.0.2
Search vendor "Nextcloud" for product "Nextcloud Server" and version " >= 16.0.0 < 16.0.2"
-
Affected
Opensuse
Search vendor "Opensuse"
Backports Sle
Search vendor "Opensuse" for product "Backports Sle"
15.0
Search vendor "Opensuse" for product "Backports Sle" and version "15.0"
sp1
Affected
Novell
Search vendor "Novell"
Suse Linux Enterprise Server
Search vendor "Novell" for product "Suse Linux Enterprise Server"
12.0
Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "12.0"
-
Affected