CVE-2023-35173
CVSS V2 None
CVSS V3 None
Description
Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.
Overview
- CVE ID
- CVE-2023-35173
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-06-23T20:50:15.948Z
- Last Modified Date
- 2023-06-23T20:50:15.948Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x7c7-v5r3-mg37 | x_refsource_CONFIRM |
https://github.com/nextcloud/end_to_end_encryption/pull/435 | x_refsource_MISC |
https://hackerone.com/reports/1914115 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-35173 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35173 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 19:56:06 | Added to TrackCVE |