First published: Fri May 20 2022(Updated: )
Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder's information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud | <3.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29160 is a vulnerability in Nextcloud Android version prior to 3.19.0 that allows sensitive information to exist after deletion of a user account.
CVE-2022-29160 affects Nextcloud Android versions prior to 3.19.0, where sensitive tokens, images, and user related details can still exist after a user account has been deleted.
The severity of CVE-2022-29160 is considered low with a severity value of 3.3.
CVE-2022-29160 can be exploited by an attacker who gains access to a user's deleted account and misuses the sensitive information that still exists.
Yes, the fix for CVE-2022-29160 is to update Nextcloud Android to version 3.19.0 or newer.