Lucene search

K
hackeroneLmxH1:154827
HistoryJul 29, 2016 - 5:41 a.m.

Nextcloud: More content spoofing through dir param in the files app

2016-07-2905:41:44
lmx
hackerone.com
$50
32

EPSS

0.005

Percentile

75.9%

Hi! It’s still possible to use an invalid dir param to spoof messages in the directory breadcrumbs area.

For example, you can use URL-encoded periods to bypass the directory traversal prevention. By referencing a path that returns a 301, you can add a message in the dir param F108266:

https://demo.nextcloud.com/index.php/apps/files/?dir=../../../.well-known/caldav/Error - please restart your computer to continue

Also, in Chrome, the presence of a null byte (%00) in the url causes a CSP error for an ajax request upon pageload, which prevents the redirect to dir=/ and allows you to put a message in the dir param F108267:

https://demo.nextcloud.com/index.php/apps/files/?dir=Error! Please restart your computer and try again

Please let me know if you need more info. Thanks!

EPSS

0.005

Percentile

75.9%