Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-37317
HistoryJun 14, 2024 - 3:25 p.m.

CVE-2024-37317 Nextcloud Notes app can be tricked into using a received share created before the user logged in

2024-06-1415:25:24
CWE-284
GitHub_M
github.com
1
nextcloud
notes
vulnerability
received share
upgrade

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

The Nextcloud Notes app is a distraction free notes taking app for Nextcloud. If an attacker managed to share a folder called Notes/ with a newly created user before they logged in, the Notes app would use that folder store the personal notes. It is recommended that the Nextcloud Notes app is upgraded to 4.9.3.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": ">= 4.6.0, < 4.9.3",
        "status": "affected"
      }
    ]
  }
]

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

Related for VULNRICHMENT:CVE-2024-37317