Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-52516 |
CWE-ID | CWE-269 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Nextcloud Server Client/Desktop applications / Messaging software Nextcloud Enterprise Server Client/Desktop applications / Messaging software |
Vendor | Nextcloud |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU103055
Risk: Low
CVSSv4.0: 0.1 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-52516
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to shares are not removed when user is limited to share with in their groups and being removed from one of them. A remote user can gain access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNextcloud Server: 28.0.0 - 29.0.4
Nextcloud Enterprise Server: 26.0.0 - 29.0.4
CPE2.3https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm
https://github.com/nextcloud/server/pull/47180
https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.