CVE-2024-52521

CWE-3282 documents2 sources
Severity
5.3MEDIUM
EPSS
0.8%
top 26.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 15

Description

Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:NExploitability: 1.2 | Impact: 1.4

Affected Packages2 packages

NVDnextcloud/nextcloud_server28.0.028.0.10+1
CVEListV5nextcloud/security-advisories>= 28.0.0, < 28.0.10, >= 29.0.0, < 29.0.7+1

Patches

🔴Vulnerability Details

1
CVEList
Nextcloud Server has a potential hash collision for background jobs could skip queuing them2024-11-15
CVE-2024-52521 (MEDIUM CVSS 5.3) | Nextcloud Server is a self hosted p | cvebase.io