Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings.
References
Link | Resource |
---|---|
https://github.com/nextcloud/richdocuments/pull/1760 | Patch Third Party Advisory |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rjcc-4cgj-6v93 | Third Party Advisory |
https://hackerone.com/reports/1253460 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-10-25 22:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-39223
Mitre link : CVE-2021-39223
CVE.ORG link : CVE-2021-39223
JSON object : View
Products Affected
nextcloud
- richdocuments
CWE