NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4 | vendor advisory issue tracking exploit |
https://github.com/nextcloud/server/pull/38194 | patch issue tracking |
https://hackerone.com/reports/1977222 | exploit mitigation third party advisory issue tracking |