CVE-2023-28998

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28998
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28998.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28998
Aliases
  • GHSA-jh3g-wpwv-cqgr
Downstream
Published
2023-04-04T12:45:42.156Z
Modified
2025-12-04T23:45:58.594483Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Nextcloud Desktop client misbehaves with E2EE when the server returns empty list of metadata keys
Details

The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files.​ Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-325"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28998.json"
}
References

Affected packages

Git / github.com/nextcloud/desktop

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/desktop
Events