Security Advisory

Back to advisories

SQL injection in Android app content provider (NC-SA-2019-005)

26th July 2019

Risk level: Low

CVSS v3 Base Score: 2.7 (AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L)

CWE: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89)

HackerOne report: 291764


The content provider of the app accepted arbitrary strings in the field list of the returned file list. This allowed an attacker to run harmful queries, destroying the local cache of the android app. The server data however was never in danger, so removing the account and setting it up again can fix all problems.

Affected Software

  • Nextcloud Android < 3.0.0 (CVE-2019-5454)

Action Taken

The error has been fixed.


It is recommended that users upgrade to version 3.0.0 or later.


The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:

  • David Enos (bluedangerforyou) - Vulnerability discovery and disclosure.

This advisory is licensed CC BY-SA 4.0.

You have javascript disabled. We tried to make sure the basics of our website work but some functionality will be missing.

This website is using cookies. By visiting you agree with our privacy policy. That's Fine