CVE-2021-32727

Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*

History

14 Jul 2021, 13:23

Type Values Removed Values Added
CWE CWE-295
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*
References (CONFIRM) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736 - (CONFIRM) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5v33-r9cm-7736 - Third Party Advisory
References (MISC) https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices - (MISC) https://github.com/nextcloud/end_to_end_encryption_rfc/blob/7f002996397faefb664019a97ebb0a1e210f64f0/RFC.md#further-devices - Third Party Advisory
References (MISC) https://github.com/nextcloud/android/pull/8438 - (MISC) https://github.com/nextcloud/android/pull/8438 - Third Party Advisory
References (MISC) https://hackerone.com/reports/1189162 - (MISC) https://hackerone.com/reports/1189162 - Permissions Required

12 Jul 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-12 21:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-32727

Mitre link : CVE-2021-32727

CVE.ORG link : CVE-2021-32727


JSON object : View

Products Affected

nextcloud

  • nextcloud
CWE
CWE-295

Improper Certificate Validation