CVE-2020-8227

Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux allowed a malicious Nextcloud Server to store files outside of the dedicated sync directory.
References
Link Resource
https://hackerone.com/reports/590319 Exploit Third Party Advisory
https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 Broken Link Exploit Vendor Advisory
https://security.gentoo.org/glsa/202009-09 Third Party Advisory
https://hackerone.com/reports/590319 Exploit Third Party Advisory
https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 Broken Link Exploit Vendor Advisory
https://security.gentoo.org/glsa/202009-09 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:nextcloud:desktop:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://hackerone.com/reports/590319 - Exploit, Third Party Advisory () https://hackerone.com/reports/590319 - Exploit, Third Party Advisory
References () https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 - Broken Link, Exploit, Vendor Advisory () https://nextcloud.com/security/advisory/?id=NC-SA-2020-032 - Broken Link, Exploit, Vendor Advisory
References () https://security.gentoo.org/glsa/202009-09 - Third Party Advisory () https://security.gentoo.org/glsa/202009-09 - Third Party Advisory

Information

Published : 2020-08-21 21:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8227

Mitre link : CVE-2020-8227

CVE.ORG link : CVE-2020-8227


JSON object : View

Products Affected

linux

  • linux_kernel

nextcloud

  • desktop
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')