![](https://seccdn.libravatar.org/avatar/a895f78a81a109471893519443e4d933.jpg?s=120&d=mm&r=g)
https://bugzilla.suse.com/show_bug.cgi?id=1226372 Bug ID: 1226372 Summary: VUL-0: CVE-2024-37313: nextcloud: ability to bypass the second factor of 2FA after successfully providing the user credentials Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/410914/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: ecsos@schirra.net Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: camila.matos@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-37313 https://www.cve.org/CVERecord?id=CVE-2024-37313 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v... https://github.com/nextcloud/server/pull/44276 https://hackerone.com/reports/2419776 -- You are receiving this mail because: You are on the CC list for the bug.