Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 | Vendor Advisory |
https://github.com/nextcloud/ios/pull/2344 | Patch |
Configurations
History
07 Apr 2023, 14:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-281 |
NVD-CWE-noinfo |
References | (MISC) https://github.com/nextcloud/ios/pull/2344 - Patch | |
References | (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - Vendor Advisory | |
CPE | cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:* | |
First Time |
Nextcloud nextcloud
Nextcloud |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
Information
Published : 2023-03-30 19:15
Updated : 2023-04-07 14:29
NVD link : CVE-2023-28647
Mitre link : CVE-2023-28647
JSON object : View
Products Affected
nextcloud
- nextcloud
CWE