CVE-2024-52521

Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*

History

23 Jan 2025, 14:52

Type Values Removed Values Added
CWE NVD-CWE-Other
CPE cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4 - () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4 - Vendor Advisory
References () https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d - () https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d - Patch
References () https://github.com/nextcloud/server/pull/47769 - () https://github.com/nextcloud/server/pull/47769 - Issue Tracking
First Time Nextcloud nextcloud Server
Nextcloud

Information

Published : 2024-11-15 17:15

Updated : 2025-01-23 14:52


NVD link : CVE-2024-52521

Mitre link : CVE-2024-52521

CVE.ORG link : CVE-2024-52521


JSON object : View

Products Affected

nextcloud

  • nextcloud_server
CWE
CWE-328

Use of Weak Hash

NVD-CWE-Other