Vulnerabilities (CVE)

Filtered by vendor Nextcloud Subscribe
Filtered by product Nextcloud
Total 53 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-32800 1 Nextcloud 1 Nextcloud 2024-11-21 6.4 MEDIUM 8.1 HIGH
Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
CVE-2021-32766 1 Nextcloud 1 Nextcloud 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.
CVE-2021-32728 2 Debian, Nextcloud 2 Debian Linux, Nextcloud 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.
CVE-2021-32727 1 Nextcloud 1 Nextcloud 2024-11-21 5.0 MEDIUM 5.7 MEDIUM
Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.
CVE-2021-32695 1 Nextcloud 1 Nextcloud 2024-11-21 4.3 MEDIUM 3.9 LOW
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose the malicious app. The shared preferences contain some limited private data such as push tokens and the account name. The vulnerability is patched in version 3.16.1.
CVE-2021-32694 1 Nextcloud 1 Nextcloud 2024-11-21 4.3 MEDIUM 4.1 MEDIUM
Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.15.1, a malicious application on the same device is possible to crash the Nextcloud Android Client due to an uncaught exception. The vulnerability is patched in version 3.15.1.
CVE-2021-32658 1 Nextcloud 1 Nextcloud 2024-11-21 2.1 LOW 4.7 MEDIUM
Nextcloud Android is the Android client for the Nextcloud open source home cloud system. Due to a timeout issue the Android client may not properly clean all sensitive data on account removal. This could include sensitive key material such as the End-to-End encryption keys. It is recommended that the Nextcloud Android App is upgraded to 3.16.1
CVE-2021-22912 1 Nextcloud 1 Nextcloud 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Nextcloud iOS before 3.4.2 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only on the local Nextcloud server unless a global search has been explicitly chosen by the user.
CVE-2021-22905 1 Nextcloud 1 Nextcloud 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Nextcloud Android App (com.nextcloud.client) before v3.16.0 is vulnerable to information disclosure due to searches for sharees being performed by default on the lookup server instead of only using the local Nextcloud server unless a global search has been explicitly chosen by the user.
CVE-2021-22896 1 Nextcloud 1 Nextcloud 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Nextcloud Mail before 1.9.5 suffers from improper access control due to a missing permission check allowing other authenticated users to create mail aliases for other users.
CVE-2021-22877 2 Fedoraproject, Nextcloud 2 Fedora, Nextcloud 2024-11-21 5.5 MEDIUM 6.5 MEDIUM
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.
CVE-2020-8293 1 Nextcloud 1 Nextcloud 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules.
CVE-2020-8259 1 Nextcloud 1 Nextcloud 2024-11-21 5.5 MEDIUM 8.1 HIGH
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.
CVE-2020-8236 1 Nextcloud 1 Nextcloud 2024-11-21 4.6 MEDIUM 6.8 MEDIUM
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.
CVE-2020-8230 1 Nextcloud 1 Nextcloud 2024-11-21 2.1 LOW 5.5 MEDIUM
A memory corruption vulnerability exists in NextCloud Desktop Client v2.6.4 where missing ASLR and DEP protections in for windows allowed to corrupt memory.
CVE-2020-8229 1 Nextcloud 1 Nextcloud 2024-11-21 4.9 MEDIUM 5.5 MEDIUM
A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.
CVE-2020-8227 1 Nextcloud 1 Nextcloud 2024-11-21 7.1 HIGH 6.8 MEDIUM
Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux allowed a malicious Nextcloud Server to store files outside of the dedicated sync directory.
CVE-2020-8225 1 Nextcloud 1 Nextcloud 2024-11-21 5.0 MEDIUM 7.5 HIGH
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8224 1 Nextcloud 1 Nextcloud 2024-11-21 4.6 MEDIUM 7.8 HIGH
A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
CVE-2020-8189 1 Nextcloud 1 Nextcloud 2024-11-21 3.5 LOW 5.4 MEDIUM
A cross-site scripting error in Nextcloud Desktop client 2.6.4 allowed to present any html (including local links) when responding with invalid data on the login attempt.