Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v | Vendor Advisory |
https://github.com/nextcloud/android/pull/11242 | Issue Tracking Patch |
Configurations
History
07 Apr 2023, 02:12
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/nextcloud/android/pull/11242 - Issue Tracking, Patch | |
References | (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 2.4 |
CWE | CWE-281 |
NVD-CWE-noinfo |
CPE | cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:* | |
First Time |
Nextcloud nextcloud
Nextcloud |
Information
Published : 2023-03-30 19:15
Updated : 2023-04-07 02:12
NVD link : CVE-2023-28646
Mitre link : CVE-2023-28646
JSON object : View
Products Affected
nextcloud
- nextcloud
CWE