Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux allowed a malicious Nextcloud Server to store files outside of the dedicated sync directory.
References
Link | Resource |
---|---|
https://hackerone.com/reports/590319 | Exploit Third Party Advisory |
https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 | Broken Link Exploit Vendor Advisory |
https://security.gentoo.org/glsa/202009-09 | Third Party Advisory |
https://hackerone.com/reports/590319 | Exploit Third Party Advisory |
https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 | Broken Link Exploit Vendor Advisory |
https://security.gentoo.org/glsa/202009-09 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/590319 - Exploit, Third Party Advisory | |
References | () https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 - Broken Link, Exploit, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202009-09 - Third Party Advisory |
Information
Published : 2020-08-21 21:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8227
Mitre link : CVE-2020-8227
CVE.ORG link : CVE-2020-8227
JSON object : View
Products Affected
linux
- linux_kernel
nextcloud
- desktop
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')