CVE-2021-41178

Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-10-25 22:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-41178

Mitre link : CVE-2021-41178

CVE.ORG link : CVE-2021-41178


JSON object : View

Products Affected

nextcloud

  • server
CWE
CWE-23

Relative Path Traversal

CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')