SQL injection in Android app content provider (NC-SA-2019-005)
26th July 2019
Risk level: Low
CVSS v3 Base Score: 2.7 (AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L)
CWE: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)
HackerOne report: 291764
Description
The content provider of the app accepted arbitrary strings in the field list of the returned file list. This allowed an attacker to run harmful queries, destroying the local cache of the android app. The server data however was never in danger, so removing the account and setting it up again can fix all problems.
Affected Software
- Nextcloud Android < 3.0.0 (CVE-2019-5454)
Action Taken
The error has been fixed.
Resolution
It is recommended that users upgrade to version 3.0.0 or later.
Acknowledgements
The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:
- David Enos (bluedangerforyou) - Vulnerability discovery and disclosure.
This advisory is licensed CC BY-SA 4.0.