
15/11/2024

6/1/2025
CVE-2024-52517: Nextcloud Server's global credentials of external storages are sent back to the frontend
First published: Fri Nov 15 2024(Updated: )
Nextcloud Server is a self hosted personal cloud system. After storing "Global credentials" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|
Nextcloud Server | >=25.0.0<25.0.13.13 | |
Nextcloud Server | >=26.0.0<26.0.13.9 | |
Nextcloud Server | >=27.0.0<27.1.11.9 | |
Nextcloud Server | >=28.0.0<28.0.11 | |
Nextcloud Server | >=28.0.0<28.0.11 | |
Nextcloud Server | >=29.0.0<29.0.8 | |
Nextcloud Server | >=29.0.0<29.0.8 | |
Nextcloud Server | >=30.0.0<30.0.1 | |
Nextcloud Server | >=30.0.0<30.0.1 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-52517?
CVE-2024-52517 has a medium severity level due to the exposure of sensitive credentials.
How do I fix CVE-2024-52517?
To fix CVE-2024-52517, it is recommended to update Nextcloud Server to the latest patched version.
What versions of Nextcloud Server are affected by CVE-2024-52517?
CVE-2024-52517 affects Nextcloud Server versions 25.0.0 to 25.0.13.13, 26.0.0 to 26.0.13.9, 27.0.0 to 27.1.11.9, 28.0.0 to 28.0.11, and 29.0.0 to 29.0.8.
What types of credentials are exposed in CVE-2024-52517?
CVE-2024-52517 exposes 'Global credentials' stored on the server in plain text.
What is the impact of exploit CVE-2024-52517?
The impact of exploiting CVE-2024-52517 allows attackers with session access to read sensitive data directly.
- agent/references
- agent/title
- agent/weakness
- agent/first-publish-date
- agent/description
- agent/type
- agent/author
- agent/event
- collector/mitre-cve
- source/MITRE
- agent/severity
- agent/remedy
- agent/last-modified-date
- agent/softwarecombine
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/nextcloud
- canonical/nextcloud server
- version/nextcloud server/25.0.0
- version/nextcloud server/26.0.0
- version/nextcloud server/27.0.0
- version/nextcloud server/28.0.0
- version/nextcloud server/29.0.0
- version/nextcloud server/30.0.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203