Description
Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
- Attack Vector
- network
- Complexity
- high
- Privileges
- low
- User Action
- required
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- low
- Availability
- none
- Weaknesses
- CWE-328NVD-CWE-Other
Metadata
- Primary Vendor
- NEXTCLOUD
- Published
- 11/15/2024
- Last Modified
- 1/23/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
nextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_servernextcloud : nextcloud_server
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.