Lucene search

K
nextcloudNextcloudGHSA-3W86-RM38-8W63
HistoryNov 11, 2022 - 2:56 p.m.

Desktop client can be tricked into opening/executing local files when clicking a nc://open/ link

2022-11-1114:56:18
github.com
20
nextcloud
security advisory
malicious links
desktop client
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

34.2%

Description

Impact

After a user received a malicious file via a share and has it synced locally or the virtual filesystem enabled, being tricked into clicking a nc://open/ link will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. “vbs”, is being executed.

Patches

It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1

Workarounds

  • Block the Nextcloud Desktop client 3.6.0 by settings the minimum.supported.desktop.version system config to 3.6.1 on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used.
  • Enforce shares to be accepted by setting the sharing.force_share_accept system config to true on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused.
  • Don’t click malicious links

References

For more information

If you have any questions or comments about this advisory:

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

34.2%