First published: Mon Aug 10 2020(Updated: )
A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Desktop | <2.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8224 is high, with a severity value of 7.8.
An attacker can exploit CVE-2020-8224 by placing a malicious OpenSSL config into a fixed directory, allowing them to load arbitrary code.
Nextcloud Desktop Client versions up to and excluding 2.6.5 are affected by CVE-2020-8224.
Yes, upgrading to Nextcloud Desktop Client version 2.6.5 or later will fix CVE-2020-8224.
You can find more information about CVE-2020-8224 in the following references: [Link 1](https://hackerone.com/reports/622170), [Link 2](https://nextcloud.com/security/advisory/?id=NC-SA-2020-030), [Link 3](https://security.gentoo.org/glsa/202009-09).