Security Advisory

Back to advisories

Linux client is vulnerable to directory traversal when downloading files (NC-SA-2020-032)

10th July 2020

Risk level: Low

CVSS v3 Base Score: 5.1 (AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L)

CWE: Path Traversal (CWE-22)

HackerOne report: 590319

Description

Missing sanitization of a server response in Nextcloud Desktop Client 2.6.4 for Linux allowed a malicious Nextcloud Server to store files outside of the dedicated sync directory.

Affected Software

  • Nextcloud Desktop < 2.6.5 (CVE-2020-8227)

Action Taken

The error has been fixed.

Resolution

It is recommended that the Nextcloud Desktop Client is upgraded to 2.6.5.

Acknowledgements

The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:

  • Carl Pearson - Vulnerability discovery and disclosure.

This advisory is licensed CC BY-SA 4.0.

You have javascript disabled. We tried to make sure the basics of our website work but some functionality will be missing.

This website is using cookies. By visiting you agree with our privacy policy. That's Fine