Lucene search

K
nextcloudNextcloudGHSA-4GFV-XQPX-42QJ
HistoryJan 09, 2023 - 5:49 a.m.

CSRF vulnerability in Nextcloud Desktop Client on Windows when clicking malicious link

2023-01-0905:49:17
github.com
28
csrf
nextcloud
desktop client
windows
vulnerability
malicious link
deep link
upgrade
hackerone
pullrequest
security advisories
support ticket

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.1%

Description

Impact

It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc)

Patches

It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2

Workarounds

No workaround available

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
desktopge3.6.1
desktople3.6.1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.1%