5.9

CVE-2024-52517

Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.

Data is provided by the National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.13.13
NextcloudNextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.13.9
NextcloudNextcloud Server SwEditionenterprise Version >= 27.0.0 < 27.1.11.9
NextcloudNextcloud Server Version >= 28.0.0 < 28.0.11
NextcloudNextcloud Server SwEditionenterprise Version >= 28.0.0 < 28.0.11
NextcloudNextcloud Server Version >= 29.0.0 < 29.0.8
NextcloudNextcloud Server SwEditionenterprise Version >= 29.0.0 < 29.0.8
NextcloudNextcloud Server Version >= 30.0.0 < 30.0.1
NextcloudNextcloud Server SwEditionenterprise Version >= 30.0.0 < 30.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.349
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
security-advisories@github.com 4.6 0.2 4
CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.