CVE-2021-37628

Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:richdocuments:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:richdocuments:*:*:*:*:*:*:*:*

History

14 Sep 2021, 17:17

Type Values Removed Values Added
CPE cpe:2.3:a:nextcloud:richdocuments:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.5
v2 : 5.0
v3 : 7.5
References (CONFIRM) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w - (CONFIRM) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w - Third Party Advisory
References (MISC) https://github.com/nextcloud/richdocuments/pull/1664 - (MISC) https://github.com/nextcloud/richdocuments/pull/1664 - Patch, Third Party Advisory
References (MISC) https://hackerone.com/reports/1253403 - (MISC) https://hackerone.com/reports/1253403 - Permissions Required, Third Party Advisory

07 Sep 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-07 21:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-37628

Mitre link : CVE-2021-37628

CVE.ORG link : CVE-2021-37628


JSON object : View

Products Affected

nextcloud

  • richdocuments
CWE
CWE-639

Authorization Bypass Through User-Controlled Key