Headline
CVE-2023-28646: App pin of the Android app can be bypassed via thirdparty apps generating deep links
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
Impact
An attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files.
Patches
It is recommended that the Nextcloud Android app is upgraded to 3.24.1
Workarounds
- No workaround available
References
- HackerOne
- PullRequest
For more information
If you have any questions or comments about this advisory:
- Create a post in nextcloud/security-advisories
- Customers: Open a support ticket at support.nextcloud.com