Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/nextcloud/android/pull/11242 | Issue Tracking Patch |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v | Vendor Advisory |
https://github.com/nextcloud/android/pull/11242 | Issue Tracking Patch |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nextcloud/android/pull/11242 - Issue Tracking, Patch | |
References | () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
Information
Published : 2023-03-30 19:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28646
Mitre link : CVE-2023-28646
CVE.ORG link : CVE-2023-28646
JSON object : View
Products Affected
nextcloud
- nextcloud
CWE