Bug ID 1226372
Summary VUL-0: CVE-2024-37313: nextcloud: ability to bypass the second factor of 2FA after successfully providing the user credentials
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/410914/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee ecsos@schirra.net
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Nextcloud server is a self hosted personal cloud system. Under some
circumstance it was possible to bypass the second factor of 2FA after
successfully providing the user credentials. It is recommended that the
Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud
Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13,
25.0.13.8, 26.0.13, 27.1.8 or 28.0.4.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-37313
https://www.cve.org/CVERecord?id=CVE-2024-37313
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c
https://github.com/nextcloud/server/pull/44276
https://hackerone.com/reports/2419776


You are receiving this mail because: