<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nextcloud</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0220-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-02-15T19:09:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-02-15T19:09:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-02-15T19:09:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nextcloud</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nextcloud fixes the following issues:

Nextcloud was updated to 15.0.14:

- NC-SA-2020-002, CVE-2019-15613: workflow rules to depend their behaviour on the file extension when checking file mimetypes  (boo#1162766)
- NC-SA-2019-016, CVE-2019-15623: Exposure of Private Information caused the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled (boo#1162775)
- NC-SA-2019-015, CVE-2019-15624: Improper Input Validation allowed group admins to create users with IDs of system folders (boo#1162776)
- NC-SA-2019-012, CVE-2020-8119: Improper authorization caused leaking of previews and files when a file-drop share link is opened via the gallery app (boo#1162781)
- NC-SA-2019-014, CVE-2020-8118: An authenticated server-side request forgery allowed to detect local and remote services when adding a new subscription in the calendar application (boo#1162782)
- NC-SA-2020-012, CVE-2019-15621: Improper permissions preservation causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link (boo#1162784)
- To many changes.
   For detail see: https://nextcloud.com/changelog/

nextcloud was updated to 13.0.12:

- Fix NC-SA-2020-001
- To many changes.
    For detail see: https://nextcloud.com/changelog/

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-220</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0220-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162766</URL>
      <Description>SUSE Bug 1162766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162775</URL>
      <Description>SUSE Bug 1162775</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162776</URL>
      <Description>SUSE Bug 1162776</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162781</URL>
      <Description>SUSE Bug 1162781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162782</URL>
      <Description>SUSE Bug 1162782</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162784</URL>
      <Description>SUSE Bug 1162784</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15613/</URL>
      <Description>SUSE CVE CVE-2019-15613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15621/</URL>
      <Description>SUSE CVE CVE-2019-15621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15623/</URL>
      <Description>SUSE CVE CVE-2019-15623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15624/</URL>
      <Description>SUSE CVE CVE-2019-15624 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8118/</URL>
      <Description>SUSE CVE CVE-2020-8118 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8119/</URL>
      <Description>SUSE CVE CVE-2020-8119 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15">
      <Branch Type="Product Name" Name="SUSE Package Hub 15">
        <FullProductName ProductID="SUSE Package Hub 15">SUSE Package Hub 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP1">
        <FullProductName ProductID="SUSE Package Hub 15 SP1">SUSE Package Hub 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-15.0.14-bp151.3.3.1">
      <FullProductName ProductID="nextcloud-15.0.14-bp151.3.3.1">nextcloud-15.0.14-bp151.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nextcloud-15.0.14-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1">nextcloud-15.0.14-bp151.3.3.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-15.0.14-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15">
      <FullProductName ProductID="SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1">nextcloud-15.0.14-bp151.3.3.1 as a component of SUSE Package Hub 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-15.0.14-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP1">
      <FullProductName ProductID="SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1">nextcloud-15.0.14-bp151.3.3.1 as a component of SUSE Package Hub 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-15.0.14-bp151.3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1">nextcloud-15.0.14-bp151.3.3.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A bug in Nextcloud Server 17.0.1 causes the workflow rules to depend their behaviour on the file extension when checking file mimetypes.</Note>
    </Notes>
    <CVE>CVE-2019-15613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15613.html</URL>
        <Description>CVE-2019-15613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162766</URL>
        <Description>SUSE Bug 1162766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link.</Note>
    </Notes>
    <CVE>CVE-2019-15621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15621.html</URL>
        <Description>CVE-2019-15621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162784</URL>
        <Description>SUSE Bug 1162784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Exposure of Private Information in Nextcloud Server 16.0.1 causes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled.</Note>
    </Notes>
    <CVE>CVE-2019-15623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15623.html</URL>
        <Description>CVE-2019-15623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162775</URL>
        <Description>SUSE Bug 1162775</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.</Note>
    </Notes>
    <CVE>CVE-2019-15624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15624.html</URL>
        <Description>CVE-2019-15624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162776</URL>
        <Description>SUSE Bug 1162776</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.</Note>
    </Notes>
    <CVE>CVE-2020-8118</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8118.html</URL>
        <Description>CVE-2020-8118</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162782</URL>
        <Description>SUSE Bug 1162782</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.</Note>
    </Notes>
    <CVE>CVE-2020-8119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>SUSE Package Hub 15:nextcloud-15.0.14-bp151.3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.1:nextcloud-15.0.14-bp151.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZKAQ7AEGBUT5BPIHKS2AN3QK2XYBODP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8119.html</URL>
        <Description>CVE-2020-8119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162781</URL>
        <Description>SUSE Bug 1162781</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
