A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://hackerone.com/reports/622170 | third party advisory exploit |
https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 | broken link vendor advisory |
https://security.gentoo.org/glsa/202009-09 | third party advisory vendor advisory |