Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
References
Link | Resource |
---|---|
https://github.com/nextcloud/richdocuments/pull/1664 | Patch Third Party Advisory |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w | Third Party Advisory |
https://hackerone.com/reports/1253403 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-09-07 21:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-37628
Mitre link : CVE-2021-37628
CVE.ORG link : CVE-2021-37628
JSON object : View
Products Affected
nextcloud
- richdocuments
CWE
CWE-639
Authorization Bypass Through User-Controlled Key