Nextcloud Server OAuth2 Client Secrets Recoverable (fixed 28.0.10/29.0.7)
CVE-2024-52519 Published on November 15, 2024
Nextcloud Server's OAuth2 client secrets were stored in a recoverable way
Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7.
Vulnerability Analysis
CVE-2024-52519 can be exploited with physical access, requires user interaction and user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Insecure Storage of Sensitive Information
The software stores sensitive information without properly limiting read or write access by unauthorized actors. If read access is not properly restricted, then attackers can steal the sensitive information. If write access is not properly restricted, then attackers can modify and possibly delete the data, causing incorrect results and possibly a denial of service.
Products Associated with CVE-2024-52519
Want to know whenever a new CVE is published for Nextcloud Server? stack.watch will email you.
Affected Versions
nextcloud security-advisories:- Version >= 28.0.0, < 28.0.10 is affected.
- Version >= 29.0.0, < 29.0.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.