Vulnerabilities > CVE-2021-37628 - Authorization Bypass Through User-Controlled Key vulnerability in Nextcloud Richdocuments
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/nextcloud/richdocuments/pull/1664
- https://github.com/nextcloud/richdocuments/pull/1664
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-954f-8w7w
- https://hackerone.com/reports/1253403
- https://hackerone.com/reports/1253403