4.3

CVE-2024-52513

Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.13.13
NextcloudNextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.13.9
NextcloudNextcloud Server SwEditionenterprise Version >= 27.0.0 < 27.1.11.9
NextcloudNextcloud Server SwEdition- Version >= 28.0.0 < 28.0.11
NextcloudNextcloud Server SwEditionenterprise Version >= 28.0.0 < 28.0.11
NextcloudNextcloud Server SwEdition- Version >= 29.0.0 < 29.0.8
NextcloudNextcloud Server SwEditionenterprise Version >= 29.0.0 < 29.0.8
NextcloudNextcloud Server SwEdition- Version >= 30.0.0 < 30.0.1
NextcloudNextcloud Server SwEditionenterprise Version >= 30.0.0 < 30.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.29
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
security-advisories@github.com 2.6 1.2 1.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.