Heise.de posting about security vulnerabilities in Nextcloud with misleading title

current security alert from heise related to Nextcloud:

https://www.heise.de/en/news/Security-vulnerabilities-in-Nextcloud-Attackers-can-intercept-emails-10055267.html

Just to avoid panic and provide right resources:

  • the most critical issue CVE-2024-52508 is inside on Mail app and in special cases leaks mail account credentials. current app version address the problem → like always keep your system updated :roll_eyes:

Best place to follow Nextcloud CVEs is GitHub - nextcloud/security-advisories: 👮 Security advisories of Nextcloud

And just for the sake of completion as Nextcloud builds on top of PHP be aware of PHP updates: 8.1.31, 8.2.26, 8.3.14 and 8.4.1 plug security leaks | heise online (IMHO CVE-2024-8932 doesn’t seem to be as critical as the article implies)

Hi there,

thanks for your post. At Nextcloud we take security very serious, which is why we follow a transparent disclosure process for security problems. Any complex piece of software has security issues, so the only real differentiation between solutions is how well they are handled. We strive to be industry leading in how we handle security.

We run a $10K security bug bounty program where we respond, on average, within 3 hours to a reported security issue. Most security issues are found and fixed by our own employees, with our bug bounty program the second source of reports. Finally, sometimes external organizations, often customers, do an audit and report issues. We greatly appreciate the input from anyone outside of Nextcloud as their reports help keep our users and customers safe.

As part of the responsible security disclosure process, we request and publish CVE’s. This is done quite some time AFTER the issues have been fixed and updates have been made available, so users who update following our recommendations should be entirely safe. The publishing is done for both transparency reasons and to allow administrators to see if their systems could have been affected by the issue.

We generally publish CVE’s every couple of months, so there is nothing special when they are published. It is just a regular reminder that all complex software has issues, administrators should update frequently and running software without updates is dangerous. This is true especially for software from vendors that do NOT regularly publish CVE’s as that often means they do not fix security issues in responsible way.

The email configurator issue is, following the strict rules of the CVE process, classified as high. Note that this reflects the severity of the result, not taking into account the actual prevalence or likelyhood users are affected by it. Users would only be affected if:

  • the users email server is running on a custom Top Level Domain (so not .com or .org but .companyname for example)
  • somebody has set up, malisiously, an autoconfigure.companyname
  • the Nextcloud Mail app is set up to auto configure (not a default) but the administrator has failed to configure an auto configuration on the email server.

The result is that the attacker gains the email username and password. Depending on these (if the user is, for example, re-using passwords, as well as use of 2-factor authentication) these can be used to compromise email or other services.
So it’s classified “High”, but if you read and understand it, it’s immediately clear that majority of Nextcloud and Nextcloud users are not affected by this ever, as only very minimal amount of users run a custom .tld address for their own mail server, don’t have auto configuration enabled on their mail server, but enable the feature in the mail app.

Nevertheless we of course recommend to update the server and all app, as well as the stack below it (PHP and operating system) and configuring it safely by using 2FA where available.

4 Likes