Upstream information
Description
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, filenames where not escaped by default in controllers using `DownloadResponse`. When a user-supplied filename was passed unsanitized into a `DownloadResponse`, this could be used to trick users into downloading malicious files with a benign file extension. This would show in UI behaviours where Nextcloud applications would display a benign file extension (e.g. JPEG), but the file will actually be downloaded with an executable file extension. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. Administrators of Nextcloud instances do not have a workaround available, but developers of Nextcloud apps may manually escape the file name before passing it into `DownloadResponse`.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 6.8 |
Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
National Vulnerability Database | |
---|---|
Base Score | 8.8 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
CVSSv3 Version | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2021:1068-1, published Wed Jul 21 03:40:09 2021
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Package Hub 12 |
| Patchnames: openSUSE-2021-1068 |
SUSE Package Hub 15 SP1 |
| Patchnames: openSUSE-2021-1068 |
SUSE Package Hub 15 SP2 |
| Patchnames: openSUSE-2021-1068 |
SUSE Package Hub 15 SP3 |
| Patchnames: openSUSE-2021-1068 |
openSUSE Leap 15.2 |
| Patchnames: openSUSE-2021-1068 |
openSUSE Leap 15.3 |
| Patchnames: openSUSE-2021-1068 |
SUSE Timeline for this CVE
CVE page created: Sun Nov 7 13:15:12 2021CVE page last modified: Tue May 23 18:08:15 2023