First published: Tue Jan 25 2022(Updated: )
The Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. The Nextcloud Android app uses content providers to manage its data. Prior to version 3.18.1, the providers `FileContentProvider` and `DiskLruImageCacheFileProvider` have security issues (an SQL injection, and an insufficient permission control, respectively) that allow malicious apps in the same device to access Nextcloud's data bypassing the permission control system. Users should upgrade to version 3.18.1 to receive a patch. There are no known workarounds aside from upgrading.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud | <3.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43863 is a security vulnerability in the Nextcloud Android app that allows for SQL injection attacks.
CVE-2021-43863 affects Nextcloud Android app versions up to and excluding 3.18.1.
CVE-2021-43863 has a severity rating of 7.5, which is considered high.
To fix CVE-2021-43863, upgrade your Nextcloud Android app to version 3.18.1 or newer.
You can find more information about CVE-2021-43863 in the references provided: [GitHub Commit](https://github.com/nextcloud/android/commit/627caba60e69e223b0fc89c4cb18eaa76a95db95), [GitHub Security Advisories](https://github.com/nextcloud/android/security/advisories/GHSA-vjp2-f63v-w479), [HackerOne Report](https://hackerone.com/reports/1358597).