A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
References
Link | Resource |
---|---|
https://hackerone.com/reports/622170 | Exploit Third Party Advisory |
https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 | Broken Link Vendor Advisory |
https://security.gentoo.org/glsa/202009-09 | Third Party Advisory |
https://hackerone.com/reports/622170 | Exploit Third Party Advisory |
https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 | Broken Link Vendor Advisory |
https://security.gentoo.org/glsa/202009-09 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/622170 - Exploit, Third Party Advisory | |
References | () https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 - Broken Link, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202009-09 - Third Party Advisory |
Information
Published : 2020-08-10 14:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8224
Mitre link : CVE-2020-8224
CVE.ORG link : CVE-2020-8224
JSON object : View
Products Affected
nextcloud
- desktop
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')