Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://hackerone.com/reports/145463 | third party advisory exploit |
https://github.com/nextcloud/server/commit/8aa0832bd449c44ec300da4189bd8ed4e036140c | issue tracking third party advisory patch |
https://owncloud.org/security/advisory/?id=oc-sa-2016-013 | patch vendor advisory |
https://nextcloud.com/security/advisory/?id=nc-sa-2016-003 | patch vendor advisory |
http://www.securityfocus.com/bid/97282 | vdb entry |
https://github.com/nextcloud/server/commit/dea8e29289a1b99d5e889627c2e377887f4f2983 | issue tracking third party advisory patch |
https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf | issue tracking third party advisory patch |
https://github.com/nextcloud/server/commit/2da43e3751576bbc838f238a09955c4dcdebee8e | issue tracking third party advisory patch |