CVE-2023-28646

Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*

History

07 Apr 2023, 02:12

Type Values Removed Values Added
References (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v - (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3rf-94h6-vj8v - Vendor Advisory
References (MISC) https://github.com/nextcloud/android/pull/11242 - (MISC) https://github.com/nextcloud/android/pull/11242 - Issue Tracking, Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 2.4
CPE cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*
First Time Nextcloud nextcloud
Nextcloud
CWE CWE-287
CWE-281
NVD-CWE-noinfo

30 Mar 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-30 19:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28646

Mitre link : CVE-2023-28646

CVE.ORG link : CVE-2023-28646


JSON object : View

Products Affected

nextcloud

  • nextcloud
CWE
NVD-CWE-noinfo CWE-281

Improper Preservation of Permissions

CWE-287

Improper Authentication