We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52513

Nextcloud Server's Attachments folder for Text app is accessible on "Files drop" and "Password protected" shares



Description

Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.

Reserved 2024-11-11 | Published 2024-11-15 | Updated 2024-11-15 | Assigner GitHub_M


LOW: 2.6CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

>= 28.0.0, < 28.0.11
affected

>= 29.0.0, < 29.0.8
affected

>= 30.0.0, < 30.0.1
affected

References

github.com/...sories/security/advisories/GHSA-gxph-5m4j-pfmj

github.com/nextcloud/text/pull/6485

github.com/...ommit/ca24b25c93b81626b4e457c260243edeab5f1548

hackerone.com/reports/2376900

cve.org (CVE-2024-52513)

nvd.nist.gov (CVE-2024-52513)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52513

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.