First published: Fri Jun 23 2023(Updated: )
Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud End-to-End Encryption | >=1.12.0<1.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-35173 is medium with a severity value of 6.5.
The vulnerability in the Nextcloud End-to-end encryption app allows an attacker to make previously dropped files inaccessible by providing an invalid metadata file.
The version of the Nextcloud End-to-end encryption app affected by CVE-2023-35173 is between 1.12.0 and 1.12.4 (inclusive).
To fix CVE-2023-35173, it is recommended to upgrade the Nextcloud End-to-end encryption app to a version that is not affected by the vulnerability.
You can find more information about CVE-2023-35173 in the following references: [GitHub Pull Request](https://github.com/nextcloud/end_to_end_encryption/pull/435), [Nextcloud Security Advisories](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37), [HackerOne Report](https://hackerone.com/reports/1914115).