Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.
References
Link | Resource |
---|---|
https://github.com/nextcloud/end_to_end_encryption/pull/435 | Patch |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37 | Vendor Advisory |
https://hackerone.com/reports/1914115 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-06-23T20:50:15.948Z
Updated: 2023-06-23T20:50:15.948Z
Reserved: 2023-06-14T14:17:52.180Z
Link: CVE-2023-35173
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-06-23T21:15:09.853
Modified: 2023-07-05T13:33:57.170
Link: CVE-2023-35173
JSON object: View
Redhat Information
No data.
CWE