Arbitrary code execution in desktop client via OpenSSL config (NC-SA-2020-030)
10th July 2020
Risk level: Low
CVSS v3 Base Score: 4.8 (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
CWE: Improper Control of Generation of Code (Code Injection) (CWE-94)
HackerOne report: 622170
Description
A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
Affected Software
- Nextcloud Desktop < 2.6.5 (CVE-2020-8224)
Action Taken
The error has been fixed.
Resolution
It is recommended that the Nextcloud Desktop Client is upgraded to 2.6.5.
Acknowledgements
The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:
This advisory is licensed CC BY-SA 4.0.