diff options
author | Joas Schilling <coding@schilljs.com> | 2020-11-13 17:32:51 +0300 |
---|---|---|
committer | Joas Schilling <coding@schilljs.com> | 2020-11-13 17:32:51 +0300 |
commit | 0ffce8a853aefe4273b34ee6b32f88282d57e07a (patch) | |
tree | bb45becf5e7806ea6cad1b538717ef903eeda7ae /advisories | |
parent | 9b5f034b0459cf0cf230b9004f14344dfcc73ed9 (diff) |
Add SAs of Octber releases
Signed-off-by: Joas Schilling <coding@schilljs.com>
Diffstat (limited to 'advisories')
-rw-r--r-- | advisories/advisories.rss | 24 | ||||
-rw-r--r-- | advisories/full-list.php | 22 | ||||
-rw-r--r-- | advisories/nc-sa-2020-038.php | 36 | ||||
-rw-r--r-- | advisories/nc-sa-2020-039.php | 34 | ||||
-rw-r--r-- | advisories/nc-sa-2020-040.php | 34 | ||||
-rw-r--r-- | advisories/nc-sa-2020-041.php | 34 |
6 files changed, 184 insertions, 0 deletions
diff --git a/advisories/advisories.rss b/advisories/advisories.rss index 5cb4a74d..5ccee624 100644 --- a/advisories/advisories.rss +++ b/advisories/advisories.rss @@ -5,6 +5,30 @@ <link>https://nextcloud.com/security/advisories/</link> <description>The Nextcloud security advisories as a RSS feed</description> <ttl>1800</ttl><item> + <title>Server: Improper integrity protection of server-side encryption keys (NC-SA-2020-041)</title> + <description>Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-041">For more information please consult the official advisory.</a></strong></p></description> + <link>https://nextcloud.com/security/advisory/?id=nC-SA-2020-041</link> + <guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2020-041</guid> + <pubDate>Sat, 03 Oct 2020 14:00:00 +0200</pubDate> + </item><item> + <title>Server: Improper confidentiality protection of server-side encryption keys (NC-SA-2020-040)</title> + <description>Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-040">For more information please consult the official advisory.</a></strong></p></description> + <link>https://nextcloud.com/security/advisory/?id=nC-SA-2020-040</link> + <guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2020-040</guid> + <pubDate>Sat, 03 Oct 2020 14:00:00 +0200</pubDate> + </item><item> + <title>Server: Downgrade encryption scheme and break integrity through known-plaintext attack (NC-SA-2020-039)</title> + <description>A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-039">For more information please consult the official advisory.</a></strong></p></description> + <link>https://nextcloud.com/security/advisory/?id=nC-SA-2020-039</link> + <guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2020-039</guid> + <pubDate>Wed, 26 Aug 2020 02:00:00 +0200</pubDate> + </item><item> + <title>Server: Message Authentication Codes calculated by the Default Encryption Module allow an attacker to silently overwrite blocks in a file (NC-SA-2020-038)</title> + <description>A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-038">For more information please consult the official advisory.</a></strong></p></description> + <link>https://nextcloud.com/security/advisory/?id=nC-SA-2020-038</link> + <guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2020-038</guid> + <pubDate>Wed, 26 Aug 2020 02:00:00 +0200</pubDate> + </item><item> <title>Server: PIN for passwordless WebAuthn is asked for but not verified (NC-SA-2020-037)</title> <description>A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-037">For more information please consult the official advisory.</a></strong></p></description> <link>https://nextcloud.com/security/advisory/?id=nC-SA-2020-037</link> diff --git a/advisories/full-list.php b/advisories/full-list.php index 2fa7505c..900c373f 100644 --- a/advisories/full-list.php +++ b/advisories/full-list.php @@ -2,6 +2,28 @@ <h2>2020</h2> +<h3>Nextcloud Server 20.0.0</h3> +<ul> + <li><a href="/security/advisory/?id=NC-SA-2020-041">Improper integrity protection of server-side encryption keys (NC-SA-2020-041)</a> 2020-10-03</li> + <li><a href="/security/advisory/?id=NC-SA-2020-040">Improper confidentiality protection of server-side encryption keys (NC-SA-2020-040)</a> 2020-10-03</li> +</ul> + +<h3>Nextcloud Server 19.0.2</h3> +<ul> + <li><a href="/security/advisory/?id=NC-SA-2020-039">Downgrade encryption scheme and break integrity through known-plaintext attack (NC-SA-2020-039)</a> 2020-08-26</li> + <li><a href="/security/advisory/?id=NC-SA-2020-038">Message Authentication Codes calculated by the Default Encryption Module allow an attacker to silently overwrite blocks in a file (NC-SA-2020-038)</a> 2020-08-26</li> +</ul> + +<h3>Nextcloud Server 18.0.8</h3> +<ul> + <li><a href="/security/advisory/?id=NC-SA-2020-038">Message Authentication Codes calculated by the Default Encryption Module allow an attacker to silently overwrite blocks in a file (NC-SA-2020-038)</a> 2020-08-26</li> +</ul> + +<h3>Nextcloud Server 17.0.10</h3> +<ul> + <li><a href="/security/advisory/?id=NC-SA-2020-038">Message Authentication Codes calculated by the Default Encryption Module allow an attacker to silently overwrite blocks in a file (NC-SA-2020-038)</a> 2020-08-26</li> +</ul> + <h3>Nextcloud Server 19.0.2</h3> <ul> <li><a href="/security/advisory/?id=NC-SA-2020-037">PIN for passwordless WebAuthn is asked for but not verified (NC-SA-2020-037)</a> 2020-08-25</li> diff --git a/advisories/nc-sa-2020-038.php b/advisories/nc-sa-2020-038.php new file mode 100644 index 00000000..c9f77be0 --- /dev/null +++ b/advisories/nc-sa-2020-038.php @@ -0,0 +1,36 @@ +<div class="row page-content-header"> +<div class="col-md-12"> + <h1>Security Advisory</h1> + <a href="/security/advisories/">Back to advisories</a> +</div> +</div> +<div class="row"> + <div class="col-md-12"> + <h2>Message Authentication Codes calculated by the Default Encryption Module allow an attacker to silently overwrite blocks in a file (NC-SA-2020-038)</h2> + <p>26th August 2020</p> + <p>Risk level: <strong>Low</strong></p> + <p>CVSS v3 Base Score: 1.8 (<a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N">AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N</a>)</p> + <p>CWE: <a href="https://cwe.mitre.org/data/definitions/657.html">Violation of Secure Design Principles (CWE-657)</a></p> + <p>HackerOne report: <a href="https://hackerone.com/reports/661051">661051</a></p> + <h3>Description</h3> + <p>A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file.</p> + <h3>Affected Software</h3> + <ul> + <li>Nextcloud Server < <strong>19.0.2</strong> (CVE-2020-8133)</li> +<li>Nextcloud Server < <strong>18.0.8</strong> (CVE-2020-8133)</li> +<li>Nextcloud Server < <strong>17.0.10</strong> (CVE-2020-8133)</li> + + </ul> + <h3>Action Taken</h3> + <p>The error has been fixed.</p> + <h3>Resolution</h3> + <p>It is recommended that the Nextcloud Server is upgraded to 19.0.2.</p> + <h3>Acknowledgements</h3> + <p>The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:</p> + <ul> + <li><a href="https://www.syseleven.de/" target="_blank" rel="noreferrer">Kevin "Kenny" Niehage - SysEleven GmbH (kenny@syseleven.de) - Vulnerability discovery and disclosure.</a></li> + </ul> + <br/> + <small style="color:grey">This advisory is licensed <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</small> + </div> +</div> diff --git a/advisories/nc-sa-2020-039.php b/advisories/nc-sa-2020-039.php new file mode 100644 index 00000000..e127d65d --- /dev/null +++ b/advisories/nc-sa-2020-039.php @@ -0,0 +1,34 @@ +<div class="row page-content-header"> +<div class="col-md-12"> + <h1>Security Advisory</h1> + <a href="/security/advisories/">Back to advisories</a> +</div> +</div> +<div class="row"> + <div class="col-md-12"> + <h2>Downgrade encryption scheme and break integrity through known-plaintext attack (NC-SA-2020-039)</h2> + <p>26th August 2020</p> + <p>Risk level: <strong>Low</strong></p> + <p>CVSS v3 Base Score: 5.3 (<a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N">AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N</a>)</p> + <p>CWE: <a href="https://cwe.mitre.org/data/definitions/310.html">Cryptographic Issues - Generic (CWE-310)</a></p> + <p>HackerOne report: <a href="https://hackerone.com/reports/742588">742588</a></p> + <h3>Description</h3> + <p>A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.</p> + <h3>Affected Software</h3> + <ul> + <li>Nextcloud Server < <strong>19.0.2</strong> (CVE-2020-8150)</li> + + </ul> + <h3>Action Taken</h3> + <p>The error has been fixed.</p> + <h3>Resolution</h3> + <p>It is recommended that the Nextcloud Server is upgraded to 19.0.2.</p> + <h3>Acknowledgements</h3> + <p>The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:</p> + <ul> + <li><a href="https://www.syseleven.de/" target="_blank" rel="noreferrer">Kevin "Kenny" Niehage - SysEleven GmbH (kenny@syseleven.de) - Vulnerability discovery and disclosure.</a></li> + </ul> + <br/> + <small style="color:grey">This advisory is licensed <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</small> + </div> +</div> diff --git a/advisories/nc-sa-2020-040.php b/advisories/nc-sa-2020-040.php new file mode 100644 index 00000000..8b47092d --- /dev/null +++ b/advisories/nc-sa-2020-040.php @@ -0,0 +1,34 @@ +<div class="row page-content-header"> +<div class="col-md-12"> + <h1>Security Advisory</h1> + <a href="/security/advisories/">Back to advisories</a> +</div> +</div> +<div class="row"> + <div class="col-md-12"> + <h2>Improper confidentiality protection of server-side encryption keys (NC-SA-2020-040)</h2> + <p>3rd October 2020</p> + <p>Risk level: <strong>Low</strong></p> + <p>CVSS v3 Base Score: 5.3 (<a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N">AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N</a>)</p> + <p>CWE: <a href="https://cwe.mitre.org/data/definitions/522.html">Insufficiently Protected Credentials (CWE-522)</a></p> + <p>HackerOne report: <a href="https://hackerone.com/reports/743505">743505</a></p> + <h3>Description</h3> + <p>Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.</p> + <h3>Affected Software</h3> + <ul> + <li>Nextcloud Server < <strong>20.0.0</strong> (CVE-2020-8152)</li> + + </ul> + <h3>Action Taken</h3> + <p>The error has been fixed.</p> + <h3>Resolution</h3> + <p>It is recommended that the Nextcloud Server is upgraded to 20.0.0.</p> + <h3>Acknowledgements</h3> + <p>The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:</p> + <ul> + <li><a href="https://www.syseleven.de/" target="_blank" rel="noreferrer">Kevin "Kenny" Niehage - SysEleven GmbH (kenny@syseleven.de) - Vulnerability discovery and disclosure.</a></li> + </ul> + <br/> + <small style="color:grey">This advisory is licensed <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</small> + </div> +</div> diff --git a/advisories/nc-sa-2020-041.php b/advisories/nc-sa-2020-041.php new file mode 100644 index 00000000..db1311d6 --- /dev/null +++ b/advisories/nc-sa-2020-041.php @@ -0,0 +1,34 @@ +<div class="row page-content-header"> +<div class="col-md-12"> + <h1>Security Advisory</h1> + <a href="/security/advisories/">Back to advisories</a> +</div> +</div> +<div class="row"> + <div class="col-md-12"> + <h2>Improper integrity protection of server-side encryption keys (NC-SA-2020-041)</h2> + <p>3rd October 2020</p> + <p>Risk level: <strong>Low</strong></p> + <p>CVSS v3 Base Score: 7.4 (<a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N">AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N</a>)</p> + <p>CWE: <a href="https://cwe.mitre.org/data/definitions/522.html">Insufficiently Protected Credentials (CWE-522)</a></p> + <p>HackerOne report: <a href="https://hackerone.com/reports/732431">732431</a></p> + <h3>Description</h3> + <p>Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.</p> + <h3>Affected Software</h3> + <ul> + <li>Nextcloud Server < <strong>20.0.0</strong> (CVE-2020-8259)</li> + + </ul> + <h3>Action Taken</h3> + <p>The error has been fixed.</p> + <h3>Resolution</h3> + <p>It is recommended that the Nextcloud Server is upgraded to 20.0.0.</p> + <h3>Acknowledgements</h3> + <p>The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:</p> + <ul> + <li><a href="https://www.syseleven.de/" target="_blank" rel="noreferrer">Kevin "Kenny" Niehage - SysEleven GmbH (kenny@syseleven.de) - Vulnerability discovery and disclosure.</a></li> + </ul> + <br/> + <small style="color:grey">This advisory is licensed <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</small> + </div> +</div> |