CVE-2024-52517

Severity
5.9MEDIUM
EPSS
0.7%
top 26.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15

Description

Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.

CVSS vector

CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:NExploitability: 0.2 | Impact: 4.0

Affected Packages2 packages

NVDnextcloud/nextcloud_server25.0.025.0.13.13+5
CVEListV5nextcloud/security-advisories>= 28.0.0, < 28.0.11, >= 29.0.0, < 29.0.8, >= 30.0.0, < 30.0.1+2

Patches

🔴Vulnerability Details

1
CVEList
Nextcloud Server's global credentials of external storages are sent back to the frontend2024-11-15
CVE-2024-52517 (MEDIUM CVSS 5.9) | Nextcloud Server is a self hosted p | cvebase.io