Lucene search

K
hackeroneRtodH1:1210424
HistoryMay 27, 2021 - 9:46 a.m.

Nextcloud: Federated editing allows iframing possibly malicious remotes

2021-05-2709:46:43
rtod
hackerone.com
$100
12

0.001 Low

EPSS

Percentile

31.3%

So this attack is less likely now that you killed the trusted server auto adding. But as far as I could tell you did not clear out old servers. Let me first describe the attack:

  1. UserA on ServerA sends a federated share to userB on serverB
  2. Assume serverA and serverB are trusted servers
  3. Now once the the trusted server is established when userB tries to edit the document it will do so on serverA. Hence the iframing
    https://github.com/nextcloud/richdocuments/blob/master/lib/AppInfo/Application.php#L239

Impact

The issue I see with this is that; not until to long ago it was trivial to establish trusted servers with federation (or from public links).

The second issue is that userB now not only has to trust serverB to be secure, properly updated etc. But also trusts implicitly serverA. ServerA could serve malicious code. That shows that the user needs to resubmit their password for example.
This is also not made clear on the settings to the admin that enabling trusted servers opens this possibility.

Now. I admit that this is all not super likely to all happen. But iframing remote sources when clicking to edit a document (which the user will just expect to open their own collabora) poses a real risk I think.

0.001 Low

EPSS

Percentile

31.3%