Improper Certificate Validation Affecting nextcloud package, versions [,3.16.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-NEXTCLOUD-2371456
  • published26 Jan 2022
  • disclosed12 Jul 2021
  • creditUnknown

Introduced: 12 Jul 2021

CVE-2021-32727  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade nextcloud to version 3.16.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation. Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.

CVSS Scores

version 3.1