Lucene search

K
nextcloudNextcloudGHSA-C3RF-94H6-VJ8V
HistoryMar 30, 2023 - 8:15 a.m.

App pin of the Android app can be bypassed via thirdparty apps generating deep links

2023-03-3008:15:26
github.com
14
android
pin bypass
thirdparty

CVSS3

4.4

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L

EPSS

0.001

Percentile

24.6%

Description

Impact

An attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files.

Patches

It is recommended that the Nextcloud Android app is upgraded to 3.24.1

Workarounds

  • No workaround available

References

For more information

If you have any questions or comments about this advisory:

CVSS3

4.4

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L

EPSS

0.001

Percentile

24.6%

Related for GHSA-C3RF-94H6-VJ8V