Nextcloud Security Advisories RSS Feed https://nextcloud.com/security/advisories/ The Nextcloud security advisories as a RSS feed 1800 Security Advisories are moving to GitHub Security Advisories We have moved our new security advisories to GitHub Security Advisories. If you rely on a RSS feed, you can find alternatives discussed in https://github.com/nextcloud/security-advisories/discussions/25. https://github.com/nextcloud/security-advisories https://github.com/nextcloud/security-advisories Wed, 2 Jun 2021 10:00:00 +0100 Desktop Client: Missing URL validation allowed RCE for the server on the Desktop client (NC-SA-2021-008) Missing validation of URLs in Nextcloud Desktop Client 3.1.2 and earlier allowed a malicious server to execute code on the client. User interaction was required.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-008">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-008 https://nextcloud.com/security/advisory/?id=nC-SA-2021-008 Wed, 24 Feb 2021 12:00:00 +0100 Deck App: New users can read all Nextcloud Deck data from previous user with same username (NC-SA-2021-007) A logic error in Nextcloud Deck 1.0.1 allowed new users with a duplicate user identifier to use deck data of a previous deleted user.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-007">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-007 https://nextcloud.com/security/advisory/?id=nC-SA-2021-007 Wed, 03 Jun 2020 12:00:00 +0200 Server: External storage app saves password for all users in the database (NC-SA-2021-006) A missing condition in Nextcloud Server 19 and prior caused the external storage app to always store the users password in a recoverable format.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-006">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-006 https://nextcloud.com/security/advisory/?id=nC-SA-2021-006 Sat, 03 Oct 2020 12:00:00 +0200 Server: Reflected XSS when renaming malicious file (NC-SA-2021-005) Missing sanitization in Nextcloud Server 20.0.5 and prior allowed to perform a reflected XSS when saving html as file name and causing an error on rename e.g. by renaming to an existing file. The risk is mostly mitigated due to the strict Content-Security-Policy (CSP) of Nextcloud, and thus mainly targets browsers not supporting CSP such as Internet Explorer.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-005">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-005 https://nextcloud.com/security/advisory/?id=nC-SA-2021-005 Mon, 25 Jan 2021 12:00:00 +0100 Server: External storage credentials stored for wrong user (NC-SA-2021-004) A missing user check in Nextcloud 20.0.5 and prior allowed to populate your own credentials for other users external storage configuration when they did not configure one yet.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-004">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-004 https://nextcloud.com/security/advisory/?id=nC-SA-2021-004 Mon, 25 Jan 2021 12:00:00 +0100 Server: Denial of Service by requesting to reset a password (NC-SA-2021-003) A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-003">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-003 https://nextcloud.com/security/advisory/?id=nC-SA-2021-003 Sat, 03 Oct 2020 14:00:00 +0200 Server: Stored XSS in markdown file with Nextcloud Talk using Internet Explorer (NC-SA-2021-002) A missing link validation in Nextcloud Server 20.0.1 allowed to execute a stored XSS attack on Internet Explorer users by saving a javascript url in a Markdown.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-002">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-002 https://nextcloud.com/security/advisory/?id=nC-SA-2021-002 Wed, 18 Nov 2020 13:00:00 +0100 Server: Potential DDoS when posting long data into workflow validation rules (NC-SA-2021-001) A missing input validation in Nextcloud Server 20.0.1 allowed users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2021-001">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2021-001 https://nextcloud.com/security/advisory/?id=nC-SA-2021-001 Wed, 18 Nov 2020 13:00:00 +0100 Contacts App: XSS through image upload of contacts using svg file (NC-SA-2020-045) A missing file type check in Nextcloud Contacts 3.3.0 allowed a malicious user to upload malicious SVG files to perform XSS attacks.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-045">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-045 https://nextcloud.com/security/advisory/?id=nC-SA-2020-045 Tue, 20 Oct 2020 14:00:00 +0200 Contacts App: XSS through image upload on contacts using svg file with png extension (NC-SA-2020-044) A missing file type check in Nextcloud Contacts 3.4.0 allowed a malicious user to upload SVG files as PNG files to perform XSS attacks.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-044">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-044 https://nextcloud.com/security/advisory/?id=nC-SA-2020-044 Tue, 20 Oct 2020 14:00:00 +0200 Social App: Social App does not validate server certificates for outgoing connections (NC-SA-2020-043) Missing validation of server certificates for out-going connections allowed a man-in-the-middle attack.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-043">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-043 https://nextcloud.com/security/advisory/?id=nC-SA-2020-043 Thu, 15 Oct 2020 14:00:00 +0200 Social App: Improper access control to messages of Social app (NC-SA-2020-042) Improper access control in Social app 0.3.1 allowed to read posts of any user.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-042">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-042 https://nextcloud.com/security/advisory/?id=nC-SA-2020-042 Thu, 15 Oct 2020 14:00:00 +0200 Server: Improper integrity protection of server-side encryption keys (NC-SA-2020-041) Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-041">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-041 https://nextcloud.com/security/advisory/?id=nC-SA-2020-041 Sat, 03 Oct 2020 14:00:00 +0200 Server: Improper confidentiality protection of server-side encryption keys (NC-SA-2020-040) Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-040">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-040 https://nextcloud.com/security/advisory/?id=nC-SA-2020-040 Sat, 03 Oct 2020 14:00:00 +0200 Server: Downgrade encryption scheme and break integrity through known-plaintext attack (NC-SA-2020-039) A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-039">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-039 https://nextcloud.com/security/advisory/?id=nC-SA-2020-039 Wed, 26 Aug 2020 02:00:00 +0200 Server: Message Authentication Codes calculated by the Default Encryption Module allow an attacker to silently overwrite blocks in a file (NC-SA-2020-038) A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-038">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-038 https://nextcloud.com/security/advisory/?id=nC-SA-2020-038 Wed, 26 Aug 2020 02:00:00 +0200 Server: PIN for passwordless WebAuthn is asked for but not verified (NC-SA-2020-037) A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-037">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-037 https://nextcloud.com/security/advisory/?id=nC-SA-2020-037 Tue, 25 Aug 2020 14:00:00 +0200 Deck App: Access control missing while viewing the attachments in the 'All boards' (NC-SA-2020-036) Missing access control in Nextcloud Deck 1.0.4 caused an insecure direct object reference allowing an attacker to view all attachments.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-036">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-036 https://nextcloud.com/security/advisory/?id=nC-SA-2020-036 Wed, 15 Jul 2020 14:00:00 +0200 Desktop Client: Missing memory corruption protection on Windows release built (NC-SA-2020-035) Missing ASLR and DEP protections in Nextcloud Desktop Client 2.6.4 for windows allowed to corrupt memory.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-035">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-035 https://nextcloud.com/security/advisory/?id=nC-SA-2020-035 Fri, 10 Jul 2020 14:00:00 +0200 Desktop Client: Memory Leak in OCUtil.dll library in Desktop client can lead to DoS (NC-SA-2020-034) A memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-034">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-034 https://nextcloud.com/security/advisory/?id=nC-SA-2020-034 Fri, 10 Jul 2020 14:00:00 +0200 Preferred providers: Missing rate limit on signup page (NC-SA-2020-033) A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-033">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-033 https://nextcloud.com/security/advisory/?id=nC-SA-2020-033 Mon, 03 Aug 2020 14:00:00 +0200 Desktop Client: Linux client is vulnerable to directory traversal when downloading files (NC-SA-2020-032) Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux allowed a malicious Nextcloud Server to store files outside of the dedicated sync directory.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-032">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-032 https://nextcloud.com/security/advisory/?id=nC-SA-2020-032 Fri, 10 Jul 2020 14:00:00 +0200 Desktop Client: Clear text storage of proxy parameters and passwords (NC-SA-2020-031) A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-031">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-031 https://nextcloud.com/security/advisory/?id=nC-SA-2020-031 Fri, 10 Jul 2020 14:00:00 +0200 Desktop Client: Arbitrary code execution in desktop client via OpenSSL config (NC-SA-2020-030) A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-030">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-030 https://nextcloud.com/security/advisory/?id=nC-SA-2020-030 Fri, 10 Jul 2020 14:00:00 +0200 Server: Re-Sharing allows increase of privileges (NC-SA-2020-029) A logic error in Nextcloud Server 19.0.0 caused a privilege escalation allowing malicious users to reshare with higher permissions than they got assigned themselves.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-029">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-029 https://nextcloud.com/security/advisory/?id=nC-SA-2020-029 Thu, 16 Jul 2020 14:00:00 +0200 Preferred providers: Possible denial of service when entering a long password (NC-SA-2020-028) Improper check of inputs in Preferred providers app 1.6.0 allowed to perform a denial of service attack when using a very long password.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-028">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-028 https://nextcloud.com/security/advisory/?id=nC-SA-2020-028 Tue, 16 Jun 2020 14:00:00 +0200 Desktop Client: XSS in desktop client via invalid server address on login form (NC-SA-2020-027) A cross-site scripting error in Nextcloud Desktop client 2.6.4 allowed to present any html (including local links) when responding with invalid data on the login attempt.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-027">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-027 https://nextcloud.com/security/advisory/?id=nC-SA-2020-027 Fri, 10 Jul 2020 14:00:00 +0200 Server: Password of share by mail is not hashed when given on the create share call (NC-SA-2020-026) A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-026">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-026 https://nextcloud.com/security/advisory/?id=nC-SA-2020-026 Thu, 04 Jun 2020 14:00:00 +0200 Deck App: Missing permission check on resharing a board (NC-SA-2020-025) Improper access control in Nextcloud Deck 0.8.0 allowed an attacker to reshare boards shared with them with more permissions than they had themselves.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-025">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-025 https://nextcloud.com/security/advisory/?id=nC-SA-2020-025 Wed, 08 Apr 2020 14:00:00 +0200 Contacts App: Limit contacts photo uploading to images (NC-SA-2020-024) A missing file type check in Nextcloud Contacts 3.2.0 allowed a malicious user to upload any file as avatars.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-024">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-024 https://nextcloud.com/security/advisory/?id=nC-SA-2020-024 Thu, 16 Apr 2020 14:00:00 +0200 Server: Increase random used for encryption (NC-SA-2020-023) A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-023">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-023 https://nextcloud.com/security/advisory/?id=nC-SA-2020-023 Thu, 04 Jun 2020 14:00:00 +0200 Deck App: Improper access control allows injecting tasks into other users decks (NC-SA-2020-022) Improper access control in Nextcloud Deck 1.0.0 allowed an attacker to inject tasks into other users decks.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-022">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-022 https://nextcloud.com/security/advisory/?id=nC-SA-2020-022 Fri, 15 May 2020 14:00:00 +0200 Talk App: Code injection possible with malformed Nextcloud Talk chat commands (NC-SA-2020-021) A too lax check in Nextcloud Talk 6.0.4, 7.0.2 and 8.0.7 allowed a code injection when a not correctly sanitized talk command was added by an administrator.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-021">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-021 https://nextcloud.com/security/advisory/?id=nC-SA-2020-021 Mon, 20 Apr 2020 14:00:00 +0200 Mail App: Mail app not verifying TLS host of mail servers (NC-SA-2020-020) A missing verification of the TLS host in Nextcloud Mail 1.1.3 allowed a man in the middle attack.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-020">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-020 https://nextcloud.com/security/advisory/?id=nC-SA-2020-020 Tue, 24 Mar 2020 13:00:00 +0100 Server: XSS in Files PDF viewer (NC-SA-2020-019) An outdated 3rd party library in the Files PDF viewer for Nextcloud Server 18.0.2 caused a Cross-site scripting vulnerability when opening a malicious PDF.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-019">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-019 https://nextcloud.com/security/advisory/?id=nC-SA-2020-019 Wed, 18 Mar 2020 13:00:00 +0100 Server: Missing ownership check on remote wipe endpoint (NC-SA-2020-018) An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-018">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-018 https://nextcloud.com/security/advisory/?id=nC-SA-2020-018 Wed, 18 Mar 2020 13:00:00 +0100 Groupfolders App: Renaming an item to a protected hidden folder deletes the target (NC-SA-2020-017) Improper access control in Groupfolders app 4.0.3 allowed to delete hidden directories when when renaming an accessible item to the same name.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-017">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-017 https://nextcloud.com/security/advisory/?id=nC-SA-2020-017 Mon, 15 Jul 2019 14:00:00 +0200 Desktop Client: Code injection in Nextcloud Desktop Client for macOS (NC-SA-2020-016) A code injection in Nextcloud Desktop Client 2.6.2 for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-016">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-016 https://nextcloud.com/security/advisory/?id=nC-SA-2020-016 Mon, 17 Feb 2020 01:00:00 +0100 Server: Secure view shares can be downloaded by manipulating the URL (NC-SA-2020-015) A missing access control check in Nextcloud Server 18.0.0 causes hide-download shares to be downloadable when appending /download to the URL.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-015">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-015 https://nextcloud.com/security/advisory/?id=nC-SA-2020-015 Fri, 07 Feb 2020 01:00:00 +0100 Server: SSRF protection bypass in calendar subscriptions (NC-SA-2020-014) A missing check for IPv4 nested inside IPv6 in Nextcloud server 17.0.1 allowed a SSRF when subscribing to a malicious calendar URL.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-014">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-014 https://nextcloud.com/security/advisory/?id=nC-SA-2020-014 Thu, 12 Dec 2019 01:00:00 +0100 Server: Event details leaked when sharing a non-public calendar event (NC-SA-2020-013) Improper preservation of permissions in Nextcloud Server 14.0.3 causes the event details to be leaked when sharing a non-public event.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-013">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-013 https://nextcloud.com/security/advisory/?id=nC-SA-2020-013 Thu, 15 Nov 2018 01:00:00 +0100 Server: Improper permission preservation on reshares (NC-SA-2020-012) Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-012">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-012 https://nextcloud.com/security/advisory/?id=nC-SA-2020-012 Thu, 27 Jun 2019 02:00:00 +0200 Talk App: Name of private conversations leaked when linked via projects to a shared item (NC-SA-2020-011) Improper access control in Nextcloud Talk 6.0.3 leaks the existance and the name of private conversations when linked them to another shared item via the projects feature.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-011">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-011 https://nextcloud.com/security/advisory/?id=nC-SA-2020-011 Mon, 29 Jul 2019 02:00:00 +0200 Deck App: Improper neutralization of item names in projects feature (NC-SA-2020-010) Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-010">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-010 https://nextcloud.com/security/advisory/?id=nC-SA-2020-010 Mon, 29 Jul 2019 02:00:00 +0200 Talk App: Improper neutralization of item names in projects feature (NC-SA-2020-009) Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-009">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-009 https://nextcloud.com/security/advisory/?id=nC-SA-2020-009 Mon, 29 Jul 2019 02:00:00 +0200 Server: Improper neutralization of item names in projects feature (NC-SA-2020-008) Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-008">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-008 https://nextcloud.com/security/advisory/?id=nC-SA-2020-008 Mon, 29 Jul 2019 02:00:00 +0200 Server: Reflected XSS in redirect of the Updater (NC-SA-2020-007) Missing escaping of HTML in the Updater of Nextcloud 15.0.5 allowed a reflected XSS when starting the updater from a malicious location.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-007">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-007 https://nextcloud.com/security/advisory/?id=nC-SA-2020-007 Tue, 26 Mar 2019 01:00:00 +0100 Server: Duplicate setup of second factor allowed (NC-SA-2020-006) A missing check in Nextcloud Server 17.0.0 allowed an attacker to set up a new second factor when trying to login.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-006">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-006 https://nextcloud.com/security/advisory/?id=nC-SA-2020-006 Fri, 25 Oct 2019 02:00:00 +0200 Server: Missing default timeout on HTTP requests (NC-SA-2020-005) Dangling remote share attempts in Nextcloud 16 allow a DNS pollution when running long.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-005">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-005 https://nextcloud.com/security/advisory/?id=nC-SA-2020-005 Wed, 04 Sep 2019 02:00:00 +0200 Android App: Bypass lock protection in Android app (NC-SA-2020-004) A wrong check for the system time in the Android App 3.9.0 causes a bypass of the lock protection when changing the time of the system to the past.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-004">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-004 https://nextcloud.com/security/advisory/?id=nC-SA-2020-004 Thu, 05 Dec 2019 01:00:00 +0100 iOS App: Missing sanitization in iOS App allows XSS (NC-SA-2020-003) Missing sanitization in the iOS App 2.24.4 causes an XSS when opening malicious HTML files.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-003">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-003 https://nextcloud.com/security/advisory/?id=nC-SA-2020-003 Wed, 20 Nov 2019 01:00:00 +0100 Server: Workflow rules only check the file extension for the mimetype instead of the content (NC-SA-2020-002) A bug in Nextcloud Server 17.0.1 causes the workflow rules to depend their behaviour on the file extension when checking file mimetypes.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-002">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-002 https://nextcloud.com/security/advisory/?id=nC-SA-2020-002 Wed, 04 Dec 2019 01:00:00 +0100 Server: 2FA sessions not properly expired on password change (NC-SA-2020-001) A bug in Nextcloud Server 15.0.2 causes pending 2FA logins to not be correctly expired when the password of the user is reset.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2020-001">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2020-001 https://nextcloud.com/security/advisory/?id=nC-SA-2020-001 Mon, 01 Apr 2019 02:00:00 +0200 Server: Reflected XSS in svg logo generation (NC-SA-2019-018) A reflected Cross-Site Scripting vunerability was discovered in the svg generation.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-018">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-018 https://nextcloud.com/security/advisory/?id=nC-SA-2019-018 Fri, 02 Aug 2019 14:00:00 +0200 iOS App: Login and token disclosure to other Nextcloud services (NC-SA-2019-017) Violation of Secure Design Principles in the iOS App 2.23.0 causes the app to leak its login and token to other Nextcloud services when search e.g. for federated users or registering for push notifications.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-017">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-017 https://nextcloud.com/security/advisory/?id=nC-SA-2019-017 Tue, 12 Nov 2019 13:00:00 +0100 Server: User IDs and Nextcloud server leaked to Nextcloud Lookup server with disabled settings (NC-SA-2019-016) Exposure of Private Information in Nextcloud Server 16.0.1 causes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-016">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-016 https://nextcloud.com/security/advisory/?id=nC-SA-2019-016 Wed, 26 Jun 2019 14:00:00 +0200 Server: Group admins can create users with IDs of system folders (NC-SA-2019-015) Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-015">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-015 https://nextcloud.com/security/advisory/?id=nC-SA-2019-015 Mon, 12 Aug 2019 14:00:00 +0200 Server: Server-Side request forgery in New-Subscription feature of the calendar app (NC-SA-2019-014) An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-014">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-014 https://nextcloud.com/security/advisory/?id=nC-SA-2019-014 Thu, 04 Jul 2019 14:00:00 +0200 Circles App: Removing emails from circles does not revoke access to shared items (NC-SA-2019-013) Improper authorization in the Circles app 0.17.7 causes retaining access when an email address was removed from a circle.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-013">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-013 https://nextcloud.com/security/advisory/?id=nC-SA-2019-013 Sun, 06 Oct 2019 14:00:00 +0200 Server: File-drop content is visible through the gallery app (NC-SA-2019-012) Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-012">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-012 https://nextcloud.com/security/advisory/?id=nC-SA-2019-012 Tue, 22 Oct 2019 14:00:00 +0200 Android App: Query restriction bypass on exposed FileContentProvider in Android app (NC-SA-2019-011) Not strictly enough sanitization allowed an attacker to get content information from protected tables when using custom queries.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-011">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-011 https://nextcloud.com/security/advisory/?id=nC-SA-2019-011 Fri, 26 Jul 2019 12:00:00 +0200 Lookup server: SQL Injection in lookup-server (NC-SA-2019-010) Improper sanitation of user input allowed any unauthenticated user to perform SQL injection attacks.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-010">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-010 https://nextcloud.com/security/advisory/?id=nC-SA-2019-010 Fri, 26 Jul 2019 12:00:00 +0200 Android App: Improper sanitization of HTML in directory names (NC-SA-2019-009) Some basic HTML tags were rendered as Markup in directory names.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-009">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-009 https://nextcloud.com/security/advisory/?id=nC-SA-2019-009 Fri, 26 Jul 2019 12:00:00 +0200 Android App: Bypass lock protection in Android app (NC-SA-2019-008) If an attacker has physical access to an Android smartphone without a screen lock, but with nextcloud installed and set up, they can circumvent the passcode protection by repeatedly opening and closing the app in a very short time.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-008">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-008 https://nextcloud.com/security/advisory/?id=nC-SA-2019-008 Fri, 26 Jul 2019 12:00:00 +0200 Android App: Thumbnails of files leaked via Android content provider (NC-SA-2019-007) If an attacker has physical access to an Android smartphone without a screen lock, but with nextcloud installed and set up, he can easily access the nextcloud-files even if the nextcloud app is locked with a fingerprint or pin.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-007">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-007 https://nextcloud.com/security/advisory/?id=nC-SA-2019-007 Fri, 26 Jul 2019 12:00:00 +0200 Android App: Bypass lock protection in Android app (NC-SA-2019-006) If an attacker has physical access to an Android smartphone without a screen lock, but with nextcloud installed and set up, they can easily access the nextcloud-files even if the nextcloud app is locked with a fingerprint or pin.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-006">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-006 https://nextcloud.com/security/advisory/?id=nC-SA-2019-006 Fri, 26 Jul 2019 12:00:00 +0200 Android App: SQL injection in Android app content provider (NC-SA-2019-005) The content provider of the app accepted arbitrary strings in the field list of the returned file list. This allowed an attacker to run harmful queries, destroying the local cache of the android app. The server data however was never in danger, so removing the account and setting it up again can fix all problems.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-005">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-005 https://nextcloud.com/security/advisory/?id=nC-SA-2019-005 Fri, 26 Jul 2019 12:00:00 +0200 Android App: Bypass lock protection in Android app (NC-SA-2019-004) Creating a fake multi-account and aborting the process would redirect the user to the default account of the device without asking for the lock pattern if one was set up.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-004">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-004 https://nextcloud.com/security/advisory/?id=nC-SA-2019-004 Fri, 26 Jul 2019 12:00:00 +0200 Server: Improper share updates could result in extended data access (NC-SA-2019-003) A bug could expose more data in reshared link shares than intended by the sharer.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-003">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-003 https://nextcloud.com/security/advisory/?id=nC-SA-2019-003 Fri, 12 Apr 2019 14:00:00 +0200 Server: Improper access control checks for share expiration date (NC-SA-2019-002) A missing check could give recipient the possibility to extend the expiration date of a share they received.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-002">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-002 https://nextcloud.com/security/advisory/?id=nC-SA-2019-002 Fri, 12 Apr 2019 14:00:00 +0200 Server: Classification of calendar events is ignored by the activity stream (NC-SA-2019-001) A missing check revealed the name of confidential events and private events to all users of a shared calendar.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2019-001">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2019-001 https://nextcloud.com/security/advisory/?id=nC-SA-2019-001 Fri, 12 Apr 2019 14:00:00 +0200 Android App: Improper check for access to application database (NC-SA-2018-015) A too permissive check allowed an installed application that contained the Nextcloud client package name to obtain access to the database of the Nextcloud application. At time of disclosure there are no applications with in the Google Play Store that fullfill this requirement.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-015">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-015 https://nextcloud.com/security/advisory/?id=nC-SA-2018-015 Fri, 26 Jul 2019 10:00:00 +0200 Server: Improper access control checks for single share previews (NC-SA-2018-014) A missing check could give unauthorized access to the previews of single file password protected shares.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-014">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-014 https://nextcloud.com/security/advisory/?id=nC-SA-2018-014 Thu, 25 Oct 2018 14:00:00 +0200 Server: Session fixation on public share page (NC-SA-2018-013) A bug causing session fixation could potentially allow an attacker to obtain access to password protected shares.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-013">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-013 https://nextcloud.com/security/advisory/?id=nC-SA-2018-013 Thu, 25 Oct 2018 14:00:00 +0200 Server: Improper authentication on public shares (NC-SA-2018-012) A missing access check could lead to continued access to password protected link shares when the owner had changed the password.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-012">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-012 https://nextcloud.com/security/advisory/?id=nC-SA-2018-012 Thu, 25 Oct 2018 14:00:00 +0200 Server: Second factor authentication bypassed if provider fails to load (NC-SA-2018-011) Missing state would not enforce the use of a second factor at login if the the provider of the second factor failed to load.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-011">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-011 https://nextcloud.com/security/advisory/?id=nC-SA-2018-011 Thu, 25 Oct 2018 14:00:00 +0200 Server: Improper validation of permissions (NC-SA-2018-010) Improper revalidation of permissions lead to not accepting access restrictions by acess tokens.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-010">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-010 https://nextcloud.com/security/advisory/?id=nC-SA-2018-010 Thu, 25 Oct 2018 14:00:00 +0200 Talk App: Stored XSS in autocomplete suggestions for chat @-mentions (NC-SA-2018-009) A missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected user names, hence malicious search results could only be crafted by authenticated users.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-009">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-009 https://nextcloud.com/security/advisory/?id=nC-SA-2018-009 Fri, 10 Aug 2018 14:00:00 +0200 Server: Stored XSS in autocomplete suggestions for file comments (NC-SA-2018-008) A missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected user names, hence malicious search results could only be crafted by authenticated users.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-008">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-008 https://nextcloud.com/security/advisory/?id=nC-SA-2018-008 Fri, 10 Aug 2018 14:00:00 +0200 Server: Bypass of 2 Factor Authentication (NC-SA-2018-007) Improper authentication of the second factor challenge would allow an attacker that had access to user credentials to bypass the second factor validation completely.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-007">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-007 https://nextcloud.com/security/advisory/?id=nC-SA-2018-007 Fri, 03 Aug 2018 14:00:00 +0200 Server: Improper validation of data passed to JSON encoder (NC-SA-2018-006) Improper validation of input allowed an attacker to not have their actions logged to the audit log.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-006">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-006 https://nextcloud.com/security/advisory/?id=nC-SA-2018-006 Fri, 03 Aug 2018 14:00:00 +0200 Contacts App: Stored XSS in contacts via group shares (NC-SA-2018-005) A missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or group admins.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-005">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-005 https://nextcloud.com/security/advisory/?id=nC-SA-2018-005 Thu, 21 Jun 2018 14:00:00 +0200 Calendar App: Stored XSS in calendar via group shares (NC-SA-2018-004) A missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or group admins.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-004">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-004 https://nextcloud.com/security/advisory/?id=nC-SA-2018-004 Thu, 21 Jun 2018 14:00:00 +0200 Server: Improper validation on OAuth2 token endpoint (NC-SA-2018-003) Improper validation of input allowed an attacker with access to the OAuth2 refresh token to obtain new tokens.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-003">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-003 https://nextcloud.com/security/advisory/?id=nC-SA-2018-003 Thu, 21 Jun 2018 14:00:00 +0200 Server: File access control rules not applied to image previews (NC-SA-2018-002) A missing check for read permissions allowed users that received an incomming share containing files tagged so they should be denied access to still request a preview for those files.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-002">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-002 https://nextcloud.com/security/advisory/?id=nC-SA-2018-002 Thu, 21 Jun 2018 14:00:00 +0200 Server: App password scope can be changed for other users (NC-SA-2018-001) A missing ownership check allowed logged-in users to change the scope of app passwords of other users. Note that the app passwords themselves where neither disclosed nor could the error be misused to identify as another user.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2018-001">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2018-001 https://nextcloud.com/security/advisory/?id=nC-SA-2018-001 Wed, 07 Feb 2018 01:00:00 +0100 Server: Calendar and addressbook names disclosed (NC-SA-2017-012) A logical error caused disclosure of calendar and addressbook names to other logged-in users. Note that no actual content of the calendar and adressbook has been disclosed.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-012">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-012 https://nextcloud.com/security/advisory/?id=nC-SA-2017-012 Mon, 08 May 2017 14:00:00 +0200 Server: Share tokens for public calendars disclosed (NC-SA-2017-011) A logical error caused disclosure of valid share tokens for public calendars. Thus granting an attacker potentially access to publicly shared calendars without knowing the share token.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-011">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-011 https://nextcloud.com/security/advisory/?id=nC-SA-2017-011 Mon, 08 May 2017 14:00:00 +0200 Server: Stored XSS in Gallery application (NC-SA-2017-010) A JavaScript library used by Nextcloud for sanitizing untrusted user-input suffered from a XSS vulnerability caused by a behaviour change in Safari 10.1 and 10.2.Note that Nextcloud employs a strict Content-Security-Policy preventing exploitation of this XSS issue on modern web browsers.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-010">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-010 https://nextcloud.com/security/advisory/?id=nC-SA-2017-010 Mon, 08 May 2017 14:00:00 +0200 Server: Limitation of app specific password scope can be bypassed (NC-SA-2017-009) Improper session handling allowed an application specific password without permission to the files access to the users file.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-009">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-009 https://nextcloud.com/security/advisory/?id=nC-SA-2017-009 Mon, 08 May 2017 14:00:00 +0200 Server: Reflected XSS in error pages (NC-SA-2017-008) Inadequate escaping of error messages leads to XSS vulnerabilities in multiple components.Note that Nextcloud employs a strict Content-Security-Policy preventing exploitation of this XSS issue on modern web browsers.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-008">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-008 https://nextcloud.com/security/advisory/?id=nC-SA-2017-008 Mon, 08 May 2017 14:00:00 +0200 Server: DOM XSS vulnerability in search dialogue (NC-SA-2017-007) Inadequate escaping lead to XSS vulnerability in the search module. To be exploitable an user has to write or paste malicious content into the search dialogue.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-007">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-007 https://nextcloud.com/security/advisory/?id=nC-SA-2017-007 Mon, 08 May 2017 14:00:00 +0200 Server: Content-Spoofing in "files" app (NC-SA-2017-006) The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-006">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-006 https://nextcloud.com/security/advisory/?id=nC-SA-2017-006 Sun, 05 Feb 2017 11:36:08 +0100 Server: Bypassing quota limitation (NC-SA-2017-005) Due to not properly sanitzing values provided by the `OC-Total-Length` HTTP header an authenticated adversary may be able to exceed their configured user quota. Thus using more space than allowed by the administrator.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-005">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-005 https://nextcloud.com/security/advisory/?id=nC-SA-2017-005 Sun, 05 Feb 2017 11:36:08 +0100 Server: Denial of Service attack (NC-SA-2017-004) Due to an error in the application logic an authenticated adversary may trigger an endless recursion in the application leading to a potential Denial of Service.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-004">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-004 https://nextcloud.com/security/advisory/?id=nC-SA-2017-004 Sun, 05 Feb 2017 11:36:08 +0100 Server: Error message discloses existence of file in write-only share (NC-SA-2017-003) Due to an error in the application logic an adversary with access to a write-only share may enumerate the names of existing files and subfolders by comparing the exception messages.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-003">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-003 https://nextcloud.com/security/advisory/?id=nC-SA-2017-003 Sun, 05 Feb 2017 11:36:08 +0100 Server: Creation of folders in read-only folders despite lacking permissions (NC-SA-2017-002) Due to a logical error in the file caching layer an authenticated adversary is able to create empty folders inside a shared folder.Note that this only affects folders and files that the adversary has at least read-only permissions for.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-002">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-002 https://nextcloud.com/security/advisory/?id=nC-SA-2017-002 Sun, 05 Feb 2017 11:36:08 +0100 Server: Permission increase on re-sharing via OCS API (NC-SA-2017-001) A permission related issue within the OCS sharing API allowed an authenticated adversary to reshare shared files with an increasing permission set. This may allow an attacker to edit files in a share despite having only a 'read' permission set.Note that this only affects folders and files that the adversary has at least read-only permissions for.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2017-001">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2017-001 https://nextcloud.com/security/advisory/?id=nC-SA-2017-001 Sun, 05 Feb 2017 11:36:08 +0100 Server: Content-Spoofing in "dav" app (NC-SA-2016-011) The exception message displayed on the DAV endpoints contained partially user-controllable input leading to a potential misrepresentation of information.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-011">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-011 https://nextcloud.com/security/advisory/?id=nC-SA-2016-011 Mon, 10 Oct 2016 13:21:06 +0200 Server: Content-Spoofing in "files" app (NC-SA-2016-010) The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-010">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-010 https://nextcloud.com/security/advisory/?id=nC-SA-2016-010 Mon, 10 Oct 2016 13:21:06 +0200 Server: Reflected XSS in Gallery application (NC-SA-2016-009) The gallery app was not properly sanitizing exception messages from the Nextcloud server. Due to an endpoint where an attacker could influence the error message this lead to a reflected Cross-Site-Scripting vulnerability.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-009">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-009 https://nextcloud.com/security/advisory/?id=nC-SA-2016-009 Mon, 10 Oct 2016 13:21:06 +0200 Server: Stored XSS in CardDAV image export (NC-SA-2016-008) The CardDAV image export functionality as implemented in Nextcloud allows the download of images stored within a vCard. Due to not performing any kind of verification on the image content this is prone to a stored Cross-Site Scripting attack.<strong>Note:</strong> Nextcloud employs a very strict Content Security Policy on the DAV endpoints. This is thus only exploitable on browsers that don't support Content Security Policy.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-008">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-008 https://nextcloud.com/security/advisory/?id=nC-SA-2016-008 Mon, 10 Oct 2016 13:21:06 +0200 Server: Improper authorization check on removing shares (NC-SA-2016-007) The Sharing Backend as implemented in Nextcloud does differentiate between shares to users and groups. In case of a received group share, users should be able to unshare the file to themselves but not to the whole group. The previous API implementation did simply unshare the file to all users in the group.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-007">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-007 https://nextcloud.com/security/advisory/?id=nC-SA-2016-007 Mon, 10 Oct 2016 13:21:06 +0200 Server: SMB User Authentication Bypass (NC-SA-2016-006) Nextcloud includes an optional and not by default enabled SMB authentication component that allows to authenticate users against an SMB server.This backend is implemented in a way that it tries to connect to a SMB server and if that succeeded consider the user logged-in.The backend did not properly take into account SMB servers that any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials.<strong>Note:</strong> The SMB backend is disabled by default and requires manual configuration in the Nextcloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability.<em><a href="https://rhinosecuritylabs.com/2016/10/operation-ownedcloud-exploitation-post-exploitation-persistence/">The reporter has published a blog post about this issue on their website as well.</a></em><br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-006">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-006 https://nextcloud.com/security/advisory/?id=nC-SA-2016-006 Mon, 10 Oct 2016 13:21:06 +0200 Server: Read-only share recipient can restore old versions of file (NC-SA-2016-005) The restore capability of Nextcloud was not verifying whether an user has only read-only access to a share. Thus an user with read-only access was able to restore old versions.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-005">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-005 https://nextcloud.com/security/advisory/?id=nC-SA-2016-005 Tue, 19 Jul 2016 10:26:09 +0200 Server: Edit permission check not enforced on WebDAV COPY action (NC-SA-2016-004) The WebDAV endpoint was not properly checking the permission on a WebDAV "COPY" action. This allowed an authenticated attacker with access to a read-only share to put new files in there. It was not possible to modify existing files.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-004">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-004 https://nextcloud.com/security/advisory/?id=nC-SA-2016-004 Tue, 19 Jul 2016 10:26:09 +0200 Server: Content-Spoofing in "files" app (NC-SA-2016-003) The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-003">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-003 https://nextcloud.com/security/advisory/?id=nC-SA-2016-003 Tue, 19 Jul 2016 10:26:09 +0200 Server: Log pollution can potentially lead to local HTML injection (NC-SA-2016-002) The "download log" functionality in the admin screen is delivering the log in JSON format to the end-user. The file was delivered with an attachment disposition forcing the browser to download the document. However, Firefox running on Microsoft Windows would offer the user to open the data in the browser as HTML document. Thus any injected data in the log would be executed.While the document would only be executed locally (thus on another scope) we have decided to fix this to protect our users.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-002">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-002 https://nextcloud.com/security/advisory/?id=nC-SA-2016-002 Tue, 19 Jul 2016 10:26:09 +0200 Server: Stored XSS in "gallery" application (NC-SA-2016-001) Due to a recent migration of the Gallery app to the new sharing endpoint a parameter changed from an integer to a string value. This value wasn't sanitized before and was thus now vulnerable to a Cross-Site-Scripting attack.To exploit this vulnerability an authenticated attacker has to share a folder with someone else, get them to open the shared folder in the Gallery app and open the sharing window there. Since Nextcloud employs a strict Content-Security-Policy this vulnerability is only exploitable in browsers not supporting Content-Security-Policy. You can check at <a href="http://caniuse.com/#feat=contentsecuritypolicy">caniuse.com</a> whether your browser supports CSP.<br/><hr/><p><strong><a href="https://nextcloud.com/security/advisory/?id=nC-SA-2016-001">For more information please consult the official advisory.</a></strong></p> https://nextcloud.com/security/advisory/?id=nC-SA-2016-001 https://nextcloud.com/security/advisory/?id=nC-SA-2016-001 Tue, 19 Jul 2016 10:26:09 +0200