<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nextcloud-desktop</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2023:0171-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-07-10T11:03:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-07-10T11:03:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-07-10T11:03:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nextcloud-desktop</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nextcloud-desktop fixes the following issues:

Update ot 3.8.0

  - Resize WebView widget once the loginpage rendered
  - Feature/secure file drop
  - Check German translation for wrong wording
  - L10n: Correct word
  - Fix displaying of file details button for local syncfileitem activities
  - Improve config upgrade warning dialog
  - Only accept folder setup page if overrideLocalDir is set
  - Update CHANGELOG.
  - Prevent ShareModel crash from accessing bad pointers
  - Bugfix/init value for pointers
  - Log to stdout when built in Debug config
  - Clean up account creation and deletion code
  - L10n: Added dot to end of sentence
  - L10n: Fixed grammar
  - Fix 'Create new folder' menu entries in settings not working correctly on macOS
  - Ci/clang tidy checks init variables
  - Fix share dialog infinite loading
  - Fix edit locally job not finding the user account: wrong user id
  - Skip e2e encrypted files with empty filename in metadata
  - Use new connect syntax
  - Fix avatars not showing up in settings dialog account actions until clicked on
  - Always discover blacklisted folders to avoid data loss when modifying selectivesync list.
  - Fix infinite loading in the share dialog when public link shares are disabled on the server
  - With cfapi when dehydrating files add missing flag
  - Fix text labels in Sync Status component
  - Display 'Search globally' as the last sharees list element
  - Fix display of 2FA notification.
  - Bugfix/do not restore virtual files
  - Show server name in tray main window
  - Add Ubuntu Lunar
  - Debian build classification 'beta' cannot override 'release'.
  - Update changelog
  - Follow shouldNotify flag to hide notifications when needed
  - Bugfix/stop after creating config file
  - E2EE cut extra zeroes from derypted byte array.
  - When local sync folder is overriden, respect this choice
  - Feature/e2ee fixes

- This update also fixes security issues:

  - (boo#1205798, CVE-2022-39331)
    - Arbitrary HyperText Markup Language injection in notifications 
  - (boo#1205799, CVE-2022-39332)
    - Arbitrary HyperText Markup Language injection in user status and information 
  - (boo#1205800, CVE-2022-39333)
    - Arbitrary HyperText Markup Language injection in desktop client application 
  - (boo#1205801, CVE-2022-39334)
    - Client incorrectly trusts invalid TLS certificates 
  - (boo#1207976, CVE-2023-23942)
    - missing sanitisation on qml labels leading to javascript injection 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2023-171</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/</URL>
      <Description>E-Mail link for openSUSE-SU-2023:0171-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205798</URL>
      <Description>SUSE Bug 1205798</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205799</URL>
      <Description>SUSE Bug 1205799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205800</URL>
      <Description>SUSE Bug 1205800</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205801</URL>
      <Description>SUSE Bug 1205801</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207976</URL>
      <Description>SUSE Bug 1207976</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-39331/</URL>
      <Description>SUSE CVE CVE-2022-39331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-39332/</URL>
      <Description>SUSE CVE CVE-2022-39332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-39333/</URL>
      <Description>SUSE CVE CVE-2022-39333 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-39334/</URL>
      <Description>SUSE CVE CVE-2022-39334 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-23942/</URL>
      <Description>SUSE CVE CVE-2023-23942 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Package Hub 15 SP5">SUSE Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="caja-extension-nextcloud-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="caja-extension-nextcloud-3.8.0-bp155.2.3.1">caja-extension-nextcloud-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1">cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnextcloudsync-devel-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="libnextcloudsync-devel-3.8.0-bp155.2.3.1">libnextcloudsync-devel-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnextcloudsync0-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="libnextcloudsync0-3.8.0-bp155.2.3.1">libnextcloudsync0-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nautilus-extension-nextcloud-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="nautilus-extension-nextcloud-3.8.0-bp155.2.3.1">nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nemo-extension-nextcloud-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="nemo-extension-nextcloud-3.8.0-bp155.2.3.1">nemo-extension-nextcloud-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-desktop-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="nextcloud-desktop-3.8.0-bp155.2.3.1">nextcloud-desktop-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-desktop-doc-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="nextcloud-desktop-doc-3.8.0-bp155.2.3.1">nextcloud-desktop-doc-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1">nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-desktop-lang-3.8.0-bp155.2.3.1">
      <FullProductName ProductID="nextcloud-desktop-lang-3.8.0-bp155.2.3.1">nextcloud-desktop-lang-3.8.0-bp155.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="caja-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:caja-extension-nextcloud-3.8.0-bp155.2.3.1">caja-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1">cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnextcloudsync-devel-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:libnextcloudsync-devel-3.8.0-bp155.2.3.1">libnextcloudsync-devel-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnextcloudsync0-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:libnextcloudsync0-3.8.0-bp155.2.3.1">libnextcloudsync0-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nautilus-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1">nautilus-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nemo-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1">nemo-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:nextcloud-desktop-3.8.0-bp155.2.3.1">nextcloud-desktop-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-doc-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1">nextcloud-desktop-doc-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1">nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-lang-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1">nextcloud-desktop-lang-3.8.0-bp155.2.3.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="caja-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:caja-extension-nextcloud-3.8.0-bp155.2.3.1">caja-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1">cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnextcloudsync-devel-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libnextcloudsync-devel-3.8.0-bp155.2.3.1">libnextcloudsync-devel-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnextcloudsync0-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:libnextcloudsync0-3.8.0-bp155.2.3.1">libnextcloudsync0-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nautilus-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1">nautilus-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nemo-extension-nextcloud-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1">nemo-extension-nextcloud-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nextcloud-desktop-3.8.0-bp155.2.3.1">nextcloud-desktop-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-doc-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1">nextcloud-desktop-doc-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1">nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-desktop-lang-3.8.0-bp155.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1">nextcloud-desktop-lang-3.8.0-bp155.2.3.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application in the notifications. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2022-39331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-39331.html</URL>
        <Description>CVE-2022-39331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205798</URL>
        <Description>SUSE Bug 1205798</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2022-39332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-39332.html</URL>
        <Description>CVE-2022-39332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205799</URL>
        <Description>SUSE Bug 1205799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2022-39333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-39333.html</URL>
        <Description>CVE-2022-39333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205800</URL>
        <Description>SUSE Bug 1205800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nextcloud also ships a CLI utility called nextcloudcmd which is sometimes used for automated scripting and headless servers. Versions of nextcloudcmd prior to 3.6.1 would incorrectly trust invalid TLS certificates, which may enable a Man-in-the-middle attack that exposes sensitive data or credentials to a network attacker. This affects the CLI only. It does not affect the standard GUI desktop Nextcloud clients, and it does not affect the Nextcloud server.</Note>
    </Notes>
    <CVE>CVE-2022-39334</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-39334.html</URL>
        <Description>CVE-2022-39334</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205801</URL>
        <Description>SUSE Bug 1205801</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Nextcloud Desktop Client is a tool to synchronize files from a Nextcloud Server with your computer. Versions prior to 3.6.3 are missing sanitisation on qml labels which are used for basic HTML elements such as `strong`, `em` and `head` lines in the UI of the desktop client. The lack of sanitisation may allow for javascript injection. It is recommended that the Nextcloud Desktop Client is upgraded to 3.6.3. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2023-23942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:caja-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync-devel-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:libnextcloudsync0-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nautilus-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nemo-extension-nextcloud-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-doc-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.5:nextcloud-desktop-lang-3.8.0-bp155.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-23942.html</URL>
        <Description>CVE-2023-23942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207976</URL>
        <Description>SUSE Bug 1207976</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
