Content-Spoofing in "files" app (NC-SA-2016-010)
10th October 2016
Risk level: Low
CVSS v3 Base Score: 3.1 (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)
HackerOne report: 154827
The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
- Nextcloud Server < 10.0.1 (CVE-2016-9467)
- Nextcloud Server < 9.0.54 (CVE-2016-9467)
The passed parameter is now verified.
It is recommended that all instances are upgraded to Nextcloud 9.0.54 or 10.0.1.
The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:
This advisory is licensed CC BY-SA 4.0.