CVE-2024-52525
CVSS V2 None
CVSS V3 None
Description
Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2.
Overview
- CVE ID
- CVE-2024-52525
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-15T16:30:28.401Z
- Last Modified Date
- 2024-11-15T17:10:50.412Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm | x_refsource_CONFIRM |
https://github.com/nextcloud/server/pull/48915 | x_refsource_MISC |
https://github.com/nextcloud/server/commit/d25a0a2896a2a981939cacb8ee0d555feef22b3b | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-52525 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52525 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-16 13:45:11 | Added to TrackCVE |