CVE-2023-28646

Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*

History

21 Nov 2024, 07:55

Type Values Removed Values Added
References () https://github.com/nextcloud/android/pull/11242 - Issue Tracking, Patch () https://github.com/nextcloud/android/pull/11242 - Issue Tracking, Patch
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v - Vendor Advisory () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v - Vendor Advisory
CVSS v2 : unknown
v3 : 2.4
v2 : unknown
v3 : 4.4

Information

Published : 2023-03-30 19:15

Updated : 2024-11-21 07:55


NVD link : CVE-2023-28646

Mitre link : CVE-2023-28646

CVE.ORG link : CVE-2023-28646


JSON object : View

Products Affected

nextcloud

  • nextcloud
CWE
CWE-281

Improper Preservation of Permissions

CWE-287

Improper Authentication

NVD-CWE-noinfo