Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user.
References
Link | Resource |
---|---|
https://github.com/nextcloud/deck/pull/1976 | Patch Third Party Advisory |
https://hackerone.com/reports/882258 | Exploit Third Party Advisory |
https://nextcloud.com/security/advisory/?id=NC-SA-2021-007 | Broken Link |
Configurations
History
02 Mar 2021, 15:04
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.3 |
References | (MISC) https://hackerone.com/reports/882258 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/nextcloud/deck/pull/1976 - Patch, Third Party Advisory | |
References | (MISC) https://nextcloud.com/security/advisory/?id=NC-SA-2021-007 - Broken Link | |
CWE | CWE-639 | |
CPE | cpe:2.3:a:nextcloud:deck:*:*:*:*:*:*:*:* |
23 Feb 2021, 19:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-02-23 19:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-8297
Mitre link : CVE-2020-8297
CVE.ORG link : CVE-2020-8297
JSON object : View
Products Affected
nextcloud
- deck
CWE
CWE-639
Authorization Bypass Through User-Controlled Key