CVE-2024-52521
CVSS V2 None
CVSS V3 None
Description
Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.
Overview
- CVE ID
- CVE-2024-52521
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-15T16:38:49.174Z
- Last Modified Date
- 2024-11-15T17:04:24.129Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4 | x_refsource_CONFIRM |
https://github.com/nextcloud/server/pull/47769 | x_refsource_MISC |
https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-52521 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52521 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-16 13:42:07 | Added to TrackCVE |