Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-10-25T21:55:11
Updated: 2024-08-04T02:59:31.637Z
Reserved: 2021-09-15T00:00:00
Link: CVE-2021-41178
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-10-25T22:15:07.913
Modified: 2024-11-21T06:25:41.047
Link: CVE-2021-41178
Redhat
No data.