First published: Tue Sep 07 2021(Updated: )
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Richdocuments | <3.8.4 | |
Nextcloud Richdocuments | >=4.0.0<4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37628 is a vulnerability in Nextcloud Richdocuments, an open source collaborative office suite, that allows bypassing of the File Drop feature, potentially enabling an attacker to read arbitrary files in a public link share.
The vulnerability in Nextcloud Richdocuments allows an attacker to bypass the File Drop feature and read arbitrary files in a public link share.
The severity of CVE-2021-37628 is classified as high, with a severity value of 7.5.
Nextcloud Richdocuments versions up to and excluding 3.8.4, as well as versions between 4.0.0 and excluding 4.2.1, are affected by CVE-2021-37628.
To fix the vulnerability in Nextcloud Richdocuments, it is recommended to update to a version beyond 4.2.1 or apply the necessary patches provided by Nextcloud.