Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-52518

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-15 Nov, 2024 | 16:46
Updated At-15 Nov, 2024 | 17:31
Rejected At-
Credits

Nextcloud Server is missing password confirmation when changing external storage options

Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:15 Nov, 2024 | 16:46
Updated At:15 Nov, 2024 | 17:31
Rejected At:
▼CVE Numbering Authority (CNA)
Nextcloud Server is missing password confirmation when changing external storage options

Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.

Affected Products
Vendor
Nextcloud GmbHnextcloud
Product
security-advisories
Versions
Affected
  • >= 28.0.0, < 28.0.12
  • >= 29.0.0, < 29.0.9
  • >= 30.0.0, < 30.0.2
Problem Types
TypeCWE IDDescription
CWECWE-287CWE-287: Improper Authentication
Type: CWE
CWE ID: CWE-287
Description: CWE-287: Improper Authentication
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg
x_refsource_CONFIRM
https://github.com/nextcloud/server/pull/48373
x_refsource_MISC
https://github.com/nextcloud/server/pull/48788
x_refsource_MISC
https://github.com/nextcloud/server/pull/48992
x_refsource_MISC
https://hackerone.com/reports/2602973
x_refsource_MISC
Hyperlink: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/nextcloud/server/pull/48373
Resource:
x_refsource_MISC
Hyperlink: https://github.com/nextcloud/server/pull/48788
Resource:
x_refsource_MISC
Hyperlink: https://github.com/nextcloud/server/pull/48992
Resource:
x_refsource_MISC
Hyperlink: https://hackerone.com/reports/2602973
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:15 Nov, 2024 | 17:15
Updated At:23 Jan, 2025 | 15:15

Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.4MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Type: Secondary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CPE Matches

Nextcloud GmbH
nextcloud
>>nextcloud_server>>Versions from 28.0.0(inclusive) to 28.0.12(exclusive)
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
Nextcloud GmbH
nextcloud
>>nextcloud_server>>Versions from 28.0.0(inclusive) to 28.0.12(exclusive)
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
Nextcloud GmbH
nextcloud
>>nextcloud_server>>Versions from 29.0.0(inclusive) to 29.0.9(exclusive)
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
Nextcloud GmbH
nextcloud
>>nextcloud_server>>Versions from 29.0.0(inclusive) to 29.0.9(exclusive)
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
Nextcloud GmbH
nextcloud
>>nextcloud_server>>Versions from 30.0.0(inclusive) to 30.0.2(exclusive)
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
Nextcloud GmbH
nextcloud
>>nextcloud_server>>Versions from 30.0.0(inclusive) to 30.0.2(exclusive)
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Secondarysecurity-advisories@github.com
CWE-863Primarynvd@nist.gov
CWE ID: CWE-287
Type: Secondary
Source: security-advisories@github.com
CWE ID: CWE-863
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rgsecurity-advisories@github.com
Vendor Advisory
https://github.com/nextcloud/server/pull/48373security-advisories@github.com
Issue Tracking
https://github.com/nextcloud/server/pull/48788security-advisories@github.com
Issue Tracking
https://github.com/nextcloud/server/pull/48992security-advisories@github.com
Issue Tracking
https://hackerone.com/reports/2602973security-advisories@github.com
Permissions Required
Hyperlink: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg
Source: security-advisories@github.com
Resource:
Vendor Advisory
Hyperlink: https://github.com/nextcloud/server/pull/48373
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/nextcloud/server/pull/48788
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://github.com/nextcloud/server/pull/48992
Source: security-advisories@github.com
Resource:
Issue Tracking
Hyperlink: https://hackerone.com/reports/2602973
Source: security-advisories@github.com
Resource:
Permissions Required

Change History

0
Information is not available yet

Similar CVEs

55Records found

CVE-2022-44610
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.11% / 30.28%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 13:17
Updated-24 Jan, 2025 | 17:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in the Intel(R) DCM software before version 5.1 may allow an authenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managerIntel(R) DCM software
CWE ID-CWE-287
Improper Authentication
CVE-2024-49256
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-5.4||MEDIUM
EPSS-0.20% / 42.03%
||
7 Day CHG~0.00%
Published-01 Nov, 2024 | 14:18
Updated-19 Nov, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Htaccess File Editor plugin <= 1.0.18 - Broken Access Control vulnerability

Incorrect Authorization vulnerability in WPChill Htaccess File Editor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Htaccess File Editor: from n/a through 1.0.18.

Action-Not Available
Vendor-wpchillWPChill
Product-htaccess_file_editorHtaccess File Editor
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-20803
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-5.4||MEDIUM
EPSS-0.15% / 36.50%
||
7 Day CHG~0.00%
Published-13 Oct, 2021 | 08:31
Updated-03 Aug, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Operation restriction bypass in the management screen of Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote authenticated attacker to alter the data of the management screen.

Action-Not Available
Vendor-Cybozu, Inc.
Product-remote_service_managerCybozu Remote Service
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-45042
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.13% / 32.74%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 17:04
Updated-12 Mar, 2025 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ory Kratos's `highest_available` setting does not properly respect code + mfa credentials

Ory Kratos is an identity, user management and authentication system for cloud services. Prior to version 1.3.0, given a number of preconditions, the `highest_available` setting will incorrectly assume that the identity’s highest available AAL is `aal1` even though it really is `aal2`. This means that the `highest_available` configuration will act as if the user has only one factor set up, for that particular user. This means that they can call the settings and whoami endpoint without a `aal2` session, even though that should be disallowed. An attacker would need to steal or guess a valid login OTP of a user who has only OTP for login enabled and who has an incorrect `available_aal` value stored, to exploit this vulnerability. All other aspects of the session (e.g. the session’s aal) are not impacted by this issue. On the Ory Network, only 0.00066% of registered users were affected by this issue, and most of those users appeared to be test users. Their respective AAL values have since been updated and they are no longer vulnerable to this attack. Version 1.3.0 is not affected by this issue. As a workaround, those who require MFA should disable the passwordless code login method. If that is not possible, check the sessions `aal` to identify if the user has `aal1` or `aal2`.

Action-Not Available
Vendor-ory
Product-kratos
CWE ID-CWE-287
Improper Authentication
CVE-2024-45128
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-5.4||MEDIUM
EPSS-0.16% / 37.45%
||
7 Day CHG~0.00%
Published-10 Oct, 2024 | 09:58
Updated-14 Oct, 2024 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Commerce | Incorrect Authorization (CWE-863)

Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and have a low impact on integrity and availability. Exploitation of this issue does not require user interaction.

Action-Not Available
Vendor-Adobe Inc.
Product-magentocommercecommerce_b2bAdobe Commerce
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • Next
Details not found