{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-37313","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-06-05T20:10:46.498Z","datePublished":"2024-06-14T14:50:44.035Z","dateUpdated":"2024-08-02T03:50:56.117Z"},"containers":{"cna":{"title":"Nextcloud server allows the by-pass the second factor","problemTypes":[{"descriptions":[{"cweId":"CWE-287","lang":"en","description":"CWE-287: Improper Authentication","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c","tags":["x_refsource_CONFIRM"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c"},{"name":"https://github.com/nextcloud/server/pull/44276","tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/server/pull/44276"},{"name":"https://hackerone.com/reports/2419776","tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/2419776"}],"affected":[{"vendor":"nextcloud","product":"security-advisories","versions":[{"version":">= 26.0.0, < 26.0.13","status":"affected"},{"version":">= 27.0.0, < 27.1.8","status":"affected"},{"version":">= 28.0.0, < 28.0.4","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-06-14T14:50:44.035Z"},"descriptions":[{"lang":"en","value":"Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to 21.0.9.17, 22.2.10.22, 23.0.12.17, 24.0.12.13, 25.0.13.8, 26.0.13, 27.1.8 or 28.0.4."}],"source":{"advisory":"GHSA-9v72-9xv5-3p7c","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"nextcloud","product":"server","cpes":["cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"26.0.0","status":"affected","lessThan":"26.0.13","versionType":"custom"},{"version":"27.0.0","status":"affected","lessThan":"27.1.8","versionType":"custom"},{"version":"28.0.0","status":"affected","lessThan":"28.0.4","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-14T15:49:53.416668Z","id":"CVE-2024-37313","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-14T15:54:44.089Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:50:56.117Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c"},{"name":"https://github.com/nextcloud/server/pull/44276","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/server/pull/44276"},{"name":"https://hackerone.com/reports/2419776","tags":["x_refsource_MISC","x_transferred"],"url":"https://hackerone.com/reports/2419776"}]}]}}