Improper Certificate Validation Affecting nextcloud-desktop package, versions <3.1.1-2+deb11u1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-NEXTCLOUDDESKTOP-1567814
- published 20 Aug 2021
- disclosed 18 Aug 2021
Introduced: 18 Aug 2021
CVE-2021-32728 Open this link in a new tabHow to fix?
Upgrade Debian:11
nextcloud-desktop
to version 3.1.1-2+deb11u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nextcloud-desktop
package and not the nextcloud-desktop
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.