{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for nextcloud","title":"Title of the patch"},{"category":"description","text":"This update for nextcloud fixes the following issues:\n\nnextcloud version 20.0.0 fix some security issues:\n\n  - NC-SA-2020-037\n    PIN for passwordless WebAuthm is asked for but not verified\n  - NC-SA-2020-033 (CVE-2020-8228)\n    Missing rate limit on signup page\n  - NC-SA-2020-029 (CVE-2020-8233, boo#1177346)\n    Re-Sharing allows increase of privileges\n  - NC-SA-2020-026\n    Passowrd of share by mail is not hashed when given on the create share call\n  - NC-SA-2020-023\n    Increase random used for encryption\n\n- Update to 19.0.3\n\n  - Fix possible leaking scope in Flow (server#22410)\n  - Combine body-login rules in theming and fix twofactor and guest styling on bright colors (server#22427)\n  - Show better quota warning for group folders and external storage (server#22442)\n  - Add php docs build script (server#22448)\n  - Fix clicks on actions menu of non opaque file rows in acceptance tests (server#22503)\n  - Fix writing BLOBs to postgres with recent contacts interaction (server#22515)\n  - Set the mount id before calling storage wrapper (server#22519)\n  - Fix S3 error handling (server#22521)\n  - Only disable zip64 if the size is known (server#22537)\n  - Change free space calculation (server#22553)\n  - Do not keep the part file if the forbidden exception has no retry set (server#22560)\n  - Fix app password updating out of bounds (server#22569)\n  - Use the correct root to determinate the webroot for the resource (server#22579)\n  - Upgrade icewind/smb to 3.2.7 (server#22581)\n  - Bump elliptic from 6.4.1 to 6.5.3 (notifications#732)\n  - Fixes regression that prevented you from toggling the encryption flag (privacy#489)\n  - Match any non-whitespace character in filesystem pattern (serverinfo#229)\n  - Catch StorageNotAvailable exceptions (text#1001)\n  - Harden read only check on public endpoints (text#1017)\n  - Harden check when using token from memcache (text#1020)\n  - Sessionid is an int (text#1029)\n  - Only overwrite Ctrl-f when text is focussed (text#990)\n  - Set the X-Requested-With header on dav requests (viewer#582)\n\n- Update to 19.0.2\n\n  - [stable19] lower minimum search length to 2 characters (server#21782)\n  - [stable19] Call openssl_pkey_export with $config and log errors. (server#21804)\n  - [stable19] Improve error reporting on sharing errors (server#21806)\n  - [stable19] Do not log RequestedRangeNotSatisfiable exceptions in DAV (server#21840)\n  - [stable19] Fix parsing of language code (server#21857)\n  - [stable19] fix typo in revokeShare() (server#21876)\n  - [stable19] Discourage webauthn user interaction (server#21917)\n  - [stable19] Encryption is ready if master key is enabled (server#21935)\n  - [stable19] Disable fragile comments tests (server#21939)\n  - [stable19] Do not double encode the userid in webauthn login (server#21953)\n  - [stable19] update icewind/smb to 3.2.6 (server#21955)\n  - [stable19] Respect default share permissions (server#21967)\n  - [stable19] allow admin to configure the max trashbin size (server#21975)\n  - [stable19] Fix risky test in twofactor_backupcodes (server#21978)\n  - [stable19] Fix PHPUnit deprecation warnings (server#21981)\n  - [stable19] fix moving files from external storage to object store trashbin (server#21983)\n  - [stable19] Ignore whitespace in sharing by mail (server#21991)\n  - [stable19] Properly fetch translation for remote wipe confirmation dialog (server#22036)\n  - [stable19] parse_url returns null in case a parameter is not found (server#22044)\n  - Bump elliptic from 6.5.2 to 6.5.3 (server#22050)\n  - [stable19] Correctly remove usergroup shares on removing group members (server#22053)\n  - [stable19] Fix height to big for iPhone when using many apps (server#22064)\n  - [stable19] reset the cookie internally in new API when abandoning paged results op (server#22069)\n  - [stable19] Add Guzzle's InvalidArgumentException (server#22070)\n  - [stable19] contactsmanager shall limit number of results early (server#22091)\n  - [stable19] Fix browser freeze on long password input (server#22094)\n  - [stable19] Search also the email and displayname in user mangement for groups (server#22118)\n  - [stable19] Ensured large image is unloaded from memory when generating previews (server#22121)\n  - [stable19] fix display of remote users in incoming share notifications (server#22131)\n  - [stable19] Reuse cache for directory mtime/size if filesystem changes can be ignored (server#22171)\n  - [stable19] Remove unexpected argument (server#22178)\n  - [stable19] Do not exit if available space cannot be determined on file transfer (server#22181)\n  - [stable19] Fix empty 'more' apps navigation after installing an app (server#22183)\n  - [stable19] Fix default log_rotate_size in config.sample.php (server#22192)\n  - [stable19] shortcut in reading nested group members when IN_CHAIN is available (server#22203)\n  - [stable19] Fix chmod on file descriptor (server#22208)\n  - [stable19] Do clearstatcache() on rmdir (server#22209)\n  - [stable19] SSE enhancement of file signature (server#22210)\n  - [stable19] remove logging message carrying no valuable information (server#22215)\n  - [stable19] Add app config option to disable 'Email was changed by admin' activity (server#22232)\n  - [stable19] Delete chunks if the move on an upload failed (server#22239)\n  - [stable19] Silence duplicate session warnings (server#22247)\n  - [3rdparty] Doctrine: Fix unquoted stmt fragments backslash escaping (server#22252)\n  - [stable19] Allow to disable share emails (server#22300)\n  - [stable19] Show disabled user count in occ user:report (server#22302)\n  - Bump 3rdparty to last stable19 commit (server#22303)\n  - [stable19] fixing a logged deprecation message (server#22309)\n  - [stable19] CalDAV: Add ability to limit sharing to owner (server#22333)\n  - [stable19] Only copy the link when updating a share or no password was forced (server#22337)\n  - [stable19] Remove encryption option for nextcloud external storage (server#22341)\n  - [stable19] l10n:Correct appid for WebAuthn (server#22348)\n  - [stable19] Properly search for users when limittogroups is enabled (server#22355)\n  - [stable19] SSE: make legacy format opt in (server#22381)\n  - [stable19] Update the CRL (server#22387)\n  - [stable19] Fix missing FN from federated contact (server#22400)\n  - [stable19] fix event icon sizes and text alignment (server#22414)\n  - [stable19] Bump stecman/symfony-console-completion from 0.8.0 to 0.11.0 (3rdparty#457)\n  - [stable19] Add Guzzle's InvalidArgumentException (3rdparty#474)\n  - [stable19] Doctrine: Fix unquoted stmt fragments backslash escaping (3rdparty#486)\n  - [stable19] Fix cypress (viewer#545)\n  - Move to webpack vue global config & bump deps (viewer#558)\n\n- Update to 19.0.1\n\n  - Security update\n    Fix (CVE-2020-8183, NC-SA-2020-026, CWE-256)\n    A logic error in Nextcloud Server 19.0.0 caused a plaintext \n    storage of the share password when it was given on the initial\n    create API call.\n\n- Update to 19.0.0\n\n  * Changes\n    Nextcloud Hub v19, code name “home office”, represents a big step forward \n    for remote collaboration in teams. \n    This release brings document collaboration to video chats,\n    introduces password-less login and improves performance.\n    As this is a major release, the changelog is too long to put here. \n    Users can look at github milestones to find what has been merged. \n    A quick overview of what is new:\n    - password-less authentication and many other security measures\n    - Talk 9 with built-in office document editing courtesy of Collabora, a grid view & more\n    - MUCH improved performance, Deck integration in Calendar, guest account groups and more!\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-2020-1652","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1652-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2020:1652-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWBOJYWMDZM3KUZWE3WE7OUUHDQ6Z7BX/"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2020:1652-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWBOJYWMDZM3KUZWE3WE7OUUHDQ6Z7BX/"},{"category":"self","summary":"SUSE Bug 1171572","url":"https://bugzilla.suse.com/1171572"},{"category":"self","summary":"SUSE Bug 1171579","url":"https://bugzilla.suse.com/1171579"},{"category":"self","summary":"SUSE Bug 1177346","url":"https://bugzilla.suse.com/1177346"},{"category":"self","summary":"SUSE CVE CVE-2020-8154 page","url":"https://www.suse.com/security/cve/CVE-2020-8154/"},{"category":"self","summary":"SUSE CVE CVE-2020-8155 page","url":"https://www.suse.com/security/cve/CVE-2020-8155/"},{"category":"self","summary":"SUSE CVE CVE-2020-8183 page","url":"https://www.suse.com/security/cve/CVE-2020-8183/"},{"category":"self","summary":"SUSE CVE CVE-2020-8228 page","url":"https://www.suse.com/security/cve/CVE-2020-8228/"},{"category":"self","summary":"SUSE CVE CVE-2020-8233 page","url":"https://www.suse.com/security/cve/CVE-2020-8233/"}],"title":"Security update for nextcloud","tracking":{"current_release_date":"2020-10-10T18:24:59Z","generator":{"date":"2020-10-10T18:24:59Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2020:1652-1","initial_release_date":"2020-10-10T18:24:59Z","revision_history":[{"date":"2020-10-10T18:24:59Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"nextcloud-20.0.0-bp152.2.3.1.noarch","product":{"name":"nextcloud-20.0.0-bp152.2.3.1.noarch","product_id":"nextcloud-20.0.0-bp152.2.3.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_name","name":"SUSE Package Hub 12","product":{"name":"SUSE Package Hub 12","product_id":"SUSE Package Hub 12","product_identification_helper":{"cpe":"cpe:/o:suse:packagehub:12"}}},{"category":"product_name","name":"SUSE Package Hub 15 SP1","product":{"name":"SUSE Package Hub 15 SP1","product_id":"SUSE Package Hub 15 SP1"}},{"category":"product_name","name":"SUSE Package Hub 15 SP2","product":{"name":"SUSE Package Hub 15 SP2","product_id":"SUSE Package Hub 15 SP2"}},{"category":"product_name","name":"openSUSE Leap 15.1","product":{"name":"openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.1"}}},{"category":"product_name","name":"openSUSE Leap 15.2","product":{"name":"openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"nextcloud-20.0.0-bp152.2.3.1.noarch as component of SUSE Package Hub 12","product_id":"SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch"},"product_reference":"nextcloud-20.0.0-bp152.2.3.1.noarch","relates_to_product_reference":"SUSE Package Hub 12"},{"category":"default_component_of","full_product_name":{"name":"nextcloud-20.0.0-bp152.2.3.1.noarch as component of SUSE Package Hub 15 SP1","product_id":"SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch"},"product_reference":"nextcloud-20.0.0-bp152.2.3.1.noarch","relates_to_product_reference":"SUSE Package Hub 15 SP1"},{"category":"default_component_of","full_product_name":{"name":"nextcloud-20.0.0-bp152.2.3.1.noarch as component of SUSE Package Hub 15 SP2","product_id":"SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch"},"product_reference":"nextcloud-20.0.0-bp152.2.3.1.noarch","relates_to_product_reference":"SUSE Package Hub 15 SP2"},{"category":"default_component_of","full_product_name":{"name":"nextcloud-20.0.0-bp152.2.3.1.noarch as component of openSUSE Leap 15.1","product_id":"openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch"},"product_reference":"nextcloud-20.0.0-bp152.2.3.1.noarch","relates_to_product_reference":"openSUSE Leap 15.1"},{"category":"default_component_of","full_product_name":{"name":"nextcloud-20.0.0-bp152.2.3.1.noarch as component of openSUSE Leap 15.2","product_id":"openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"},"product_reference":"nextcloud-20.0.0-bp152.2.3.1.noarch","relates_to_product_reference":"openSUSE Leap 15.2"}]},"vulnerabilities":[{"cve":"CVE-2020-8154","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8154"}],"notes":[{"category":"general","text":"An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-8154","url":"https://www.suse.com/security/cve/CVE-2020-8154"},{"category":"external","summary":"SUSE Bug 1171579 for CVE-2020-8154","url":"https://bugzilla.suse.com/1171579"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"threats":[{"category":"impact","date":"2020-10-10T18:24:59Z","details":"moderate"}],"title":"CVE-2020-8154"},{"cve":"CVE-2020-8155","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8155"}],"notes":[{"category":"general","text":"An outdated 3rd party library in the Files PDF viewer for Nextcloud Server 18.0.2 caused a Cross-site scripting vulnerability when opening a malicious PDF.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-8155","url":"https://www.suse.com/security/cve/CVE-2020-8155"},{"category":"external","summary":"SUSE Bug 1171572 for CVE-2020-8155","url":"https://bugzilla.suse.com/1171572"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"products":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"threats":[{"category":"impact","date":"2020-10-10T18:24:59Z","details":"low"}],"title":"CVE-2020-8155"},{"cve":"CVE-2020-8183","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8183"}],"notes":[{"category":"general","text":"A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-8183","url":"https://www.suse.com/security/cve/CVE-2020-8183"},{"category":"external","summary":"SUSE Bug 1178384 for CVE-2020-8183","url":"https://bugzilla.suse.com/1178384"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"threats":[{"category":"impact","date":"2020-10-10T18:24:59Z","details":"important"}],"title":"CVE-2020-8183"},{"cve":"CVE-2020-8228","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8228"}],"notes":[{"category":"general","text":"A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-8228","url":"https://www.suse.com/security/cve/CVE-2020-8228"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"threats":[{"category":"impact","date":"2020-10-10T18:24:59Z","details":"moderate"}],"title":"CVE-2020-8228"},{"cve":"CVE-2020-8233","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-8233"}],"notes":[{"category":"general","text":"A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-8233","url":"https://www.suse.com/security/cve/CVE-2020-8233"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 12:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP1:nextcloud-20.0.0-bp152.2.3.1.noarch","SUSE Package Hub 15 SP2:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.1:nextcloud-20.0.0-bp152.2.3.1.noarch","openSUSE Leap 15.2:nextcloud-20.0.0-bp152.2.3.1.noarch"]}],"threats":[{"category":"impact","date":"2020-10-10T18:24:59Z","details":"critical"}],"title":"CVE-2020-8233"}]}