{"affected":[{"ecosystem_specific":{"binaries":[{"nextcloud":"15.0.14-bp151.3.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 12","name":"nextcloud","purl":"pkg:rpm/suse/nextcloud&distro=SUSE%20Package%20Hub%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"15.0.14-bp151.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nextcloud":"15.0.14-bp151.3.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15","name":"nextcloud","purl":"pkg:rpm/suse/nextcloud&distro=SUSE%20Package%20Hub%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"15.0.14-bp151.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nextcloud":"15.0.14-bp151.3.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP1","name":"nextcloud","purl":"pkg:rpm/suse/nextcloud&distro=SUSE%20Package%20Hub%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"15.0.14-bp151.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nextcloud":"15.0.14-bp151.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"nextcloud","purl":"pkg:rpm/opensuse/nextcloud&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"15.0.14-bp151.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nextcloud fixes the following issues:\n\nNextcloud was updated to 15.0.14:\n\n- NC-SA-2020-002, CVE-2019-15613: workflow rules to depend their behaviour on the file extension when checking file mimetypes  (boo#1162766)\n- NC-SA-2019-016, CVE-2019-15623: Exposure of Private Information caused the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled (boo#1162775)\n- NC-SA-2019-015, CVE-2019-15624: Improper Input Validation allowed group admins to create users with IDs of system folders (boo#1162776)\n- NC-SA-2019-012, CVE-2020-8119: Improper authorization caused leaking of previews and files when a file-drop share link is opened via the gallery app (boo#1162781)\n- NC-SA-2019-014, CVE-2020-8118: An authenticated server-side request forgery allowed to detect local and remote services when adding a new subscription in the calendar application (boo#1162782)\n- NC-SA-2020-012, CVE-2019-15621: Improper permissions preservation causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link (boo#1162784)\n- To many changes.\n   For detail see: https://nextcloud.com/changelog/\n\nnextcloud was updated to 13.0.12:\n\n- Fix NC-SA-2020-001\n- To many changes.\n    For detail see: https://nextcloud.com/changelog/\n\n","id":"openSUSE-SU-2020:0220-1","modified":"2020-02-15T19:09:47Z","published":"2020-02-15T19:09:47Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162775"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162782"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15613"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15621"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-15624"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8118"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8119"}],"related":["CVE-2019-15613","CVE-2019-15621","CVE-2019-15623","CVE-2019-15624","CVE-2020-8118","CVE-2020-8119"],"summary":"Security update for nextcloud","upstream":["CVE-2019-15613","CVE-2019-15621","CVE-2019-15623","CVE-2019-15624","CVE-2020-8118","CVE-2020-8119"]}