First published: Tue Apr 04 2023(Updated: )
Nextcloud is an open-source productivity platform. In Nextcloud Desktop client 3.0.0 until 3.8.0, Nextcloud Android app 3.13.0 until 3.25.0, and Nextcloud iOS app 3.0.5 until 4.8.0, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure and add new files. This issue is fixed in Nextcloud Desktop 3.8.0, Nextcloud Android 3.25.0, and Nextcloud iOS 4.8.0. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Desktop | >=3.0.0<3.8.0 | |
Nextcloud Nextcloud | >=3.0.5<4.8.0 | |
Nextcloud Nextcloud | >=3.13.0<3.25.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28999 is a vulnerability that allows a malicious server administrator to gain full access to an end-to-end encrypted folder in Nextcloud Desktop client, Nextcloud Android app, and Nextcloud iOS app.
The severity of CVE-2023-28999 is medium, with a CVSS score of 6.4.
Nextcloud Desktop client versions 3.0.0 to 3.8.0, Nextcloud Android app versions 3.13.0 to 3.25.0, and Nextcloud iOS app versions 3.0.5 to 4.8.0 are affected by CVE-2023-28999.
A malicious server administrator can exploit CVE-2023-28999 to gain full access to an end-to-end encrypted folder and decrypt files.
Yes, you can find references for CVE-2023-28999 at the following links: [link1], [link2], [link3].