CVE-2024-52513
LOWNextcloud Server < 25.0.13.13 - Information Disclosure
Title source: ruleDescription
Nextcloud Server is a self hosted personal cloud system. After receiving a "Files drop" or "Password protected" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj
Issue Tracking x_refsource_misc
https://github.com/nextcloud/text/pull/6485
Patch x_refsource_misc
https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548
Issue Tracking x_refsource_misc
https://hackerone.com/reports/2376900
Scores
CVSS v3
2.6
EPSS
0.0057
EPSS Percentile
68.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-200
Status
published
Products (2)
nextcloud/nextcloud_server
25.0.0 - 25.0.13.13
nextcloud/nextcloud_server
28.0.0 - 28.0.11
Published
Nov 15, 2024
Tracked Since
Feb 18, 2026