6.5

CVE-2024-52515

Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEditionenterprise Version >= 24.0.0 < 24.0.12.15
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.13.10
NextcloudNextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.13.4
NextcloudNextcloud Server SwEdition- Version >= 27.0.0 < 27.1.10
NextcloudNextcloud Server SwEditionenterprise Version >= 27.0.0 < 27.1.10
NextcloudNextcloud Server SwEdition- Version >= 28.0.0 < 28.0.6
NextcloudNextcloud Server SwEditionenterprise Version >= 28.0.0 < 28.0.6
NextcloudNextcloud Server SwEdition- Version >= 29.0.0 < 29.0.1
NextcloudNextcloud Server SwEditionenterprise Version >= 29.0.0 < 29.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.18% 0.4
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
security-advisories@github.com 5.7 2.1 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CWE-706 Use of Incorrectly-Resolved Name or Reference

The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.