Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug]: Nextcloud 29.0.11 & 30.0.5 contain CVE-2024-50345 #50361

Closed
4 of 8 tasks
knight-of-ni opened this issue Jan 23, 2025 · 6 comments
Closed
4 of 8 tasks

[Bug]: Nextcloud 29.0.11 & 30.0.5 contain CVE-2024-50345 #50361

knight-of-ni opened this issue Jan 23, 2025 · 6 comments
Assignees
Labels

Comments

@knight-of-ni
Copy link

knight-of-ni commented Jan 23, 2025

⚠️ This issue respects the following points: ⚠️

Bug description

CVE-2024-50345 was reported against Nextcloud in Fedora & EPEL last November.
https://bugzilla.redhat.com/show_bug.cgi?id=2324262
https://bugzilla.redhat.com/show_bug.cgi?id=2324257

Nextcloud 29.0.11 contains http-foundation 5.4.25 and Nextcloud 30.0.5 contains http-foundation 6.4.12.

The recommended fix is to upgrade to http-foundation to 5.4.46 and 6.4.14, respectively.

Does the Nextcloud team plan to address this CVE in either or both Nextcloud releases? Thank you.

Steps to reproduce

  1. Install the latest release of Nextcloud 29 or 30
  2. Check version of htt-foundation
  3. Observe the version contains the named CVE

Expected behavior

Version of http-foundation is upgraded

Nextcloud Server version

29

Operating system

RHEL/CentOS

PHP engine version

None

Web server

Apache (supported)

Database engine version

MySQL

Is this bug present after an update or on a fresh install?

Fresh Nextcloud Server install

Are you using the Nextcloud Server Encryption module?

None

What user-backends are you using?

  • Default user-backend (database)
  • LDAP/ Active Directory
  • SSO - SAML
  • Other

Configuration report

List of activated Apps

Nextcloud Signing status

Nextcloud Logs

Additional info

No response

@knight-of-ni knight-of-ni added 0. Needs triage Pending check for reproducibility or if it fits our roadmap bug labels Jan 23, 2025
@solracsf
Copy link
Member

solracsf commented Jan 23, 2025

6.4.14 is on v31: #50314
In all cases, you should follow https://github.com/nextcloud/server?tab=security-ov-file#readme

@knight-of-ni
Copy link
Author

Apologies. In hindsight I overlooked the link to the security policy, which I now see is shown in the github issue template.

I get it, this has been fixed in master branch and will be part of the next release, but the question remains. Will it be fixed in NC 29 or 30? Both versions are still supported according to release policy.

As the fedora packager, this will help me plan my own release schedule. Nextcloud 29 is of particular concern, as we can't move past that for el9 distros due to PHP requirements.

@joshtrichards
Copy link
Member

Cc: @nickvergessen

I know this isn't technically what you're asking, but for what it's worth: I don't see any use of the impacted function or classes across our ecosystem. I only see usage of IPUtils and it's an entirely independent class (that just happens to be bundled as part of http-foundation by Symfony).

@nickvergessen
Copy link
Member

Yeah we will update them soon to avoid this yields everywhere, but at the same time we are not aware the bits would be used, so it's less urgent than indicated by the SA

@knight-of-ni
Copy link
Author

That's perfect. Thank you. I completely understand this is low priority.

@nickvergessen
Copy link
Member

30 is fixed by #50463

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants