Vulnerability Details : CVE-2019-5453
Potential exploit
Bypass lock protection in the Nextcloud Android app prior to version 3.3.0 allowed access to files when being prompted for the lock protection and switching to the Nextcloud file provider.
Vulnerability category: BypassGain privilege
Products affected by CVE-2019-5453
- cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:android:*:*
- cpe:2.3:a:nextcloud:nextcloud:3.3.0:rc1:*:*:*:android:*:*
- cpe:2.3:a:nextcloud:nextcloud:3.3.0:rc2:*:*:*:android:*:*
- cpe:2.3:a:nextcloud:nextcloud:3.3.0:rc3:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-5453
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-5453
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:P/I:P/A:N |
3.9
|
4.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
0.9
|
5.2
|
NIST |
CWE ids for CVE-2019-5453
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The product requires authentication, but the product has an alternate path or channel that does not require authentication.Assigned by: support@hackerone.com (Secondary)
References for CVE-2019-5453
-
https://hackerone.com/reports/331489
Exploit;Third Party Advisory
Jump to