Bug ID | 1226372 |
---|---|
Summary | VUL-0: CVE-2024-37313: nextcloud: ability to bypass the second factor of 2FA after successfully providing the user credentials |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.6 |
Hardware | Other |
URL | https://smash.suse.de/issue/410914/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | ecsos@schirra.net |
Reporter | smash_bz@suse.de |
QA Contact | security-team@suse.de |
CC | camila.matos@suse.com |
Target Milestone | --- |
Found By | Security Response Team |
Blocker | --- |
Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-37313 https://www.cve.org/CVERecord?id=CVE-2024-37313 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c https://github.com/nextcloud/server/pull/44276 https://hackerone.com/reports/2419776