Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/security-advisories.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'old/desktop/nc-sa-2020-030.json')
-rw-r--r--old/desktop/nc-sa-2020-030.json31
1 files changed, 31 insertions, 0 deletions
diff --git a/old/desktop/nc-sa-2020-030.json b/old/desktop/nc-sa-2020-030.json
new file mode 100644
index 0000000..1d19303
--- /dev/null
+++ b/old/desktop/nc-sa-2020-030.json
@@ -0,0 +1,31 @@
+{
+ "Title": "Arbitrary code execution in desktop client via OpenSSL config",
+ "Timestamp": 1594382400,
+ "Risk": 1,
+ "CVSS3": {
+ "score": 4.8,
+ "vector": "AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
+ },
+ "CWE": {
+ "id": 94,
+ "name": "Improper Control of Generation of Code (Code Injection)"
+ },
+ "HackerOne": 622170,
+ "Affected":[
+ {
+ "Version":"2.6.5",
+ "CVE":"CVE-2020-8224",
+ "Operator":"<"
+ }
+ ],
+ "Description":"A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.",
+ "ActionTaken": "The error has been fixed.",
+ "Acknowledgment":[
+ {
+ "Name": "Nick Marcoccio",
+ "Website": "https://twitter.com/1oopho1e",
+ "Reason": "Vulnerability discovery and disclosure."
+ }
+ ],
+ "Resolution": "It is recommended that the Nextcloud Desktop Client is upgraded to 2.6.5."
+}