First published: Mon Oct 25 2021(Updated: )
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Richdocuments | <3.8.6 | |
Nextcloud Richdocuments | >=4.0.0<4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39223 is a vulnerability in the Nextcloud Richdocuments application that could result in a full path disclosure on shared files.
CVE-2021-39223 has a severity rating of 5.3 (Medium).
CVE-2021-39223 affects Nextcloud Richdocuments prior to versions 3.8.6 and 4.2.3.
The CWE (Common Weakness Enumeration) of CVE-2021-39223 is 200.
To fix CVE-2021-39223, update Nextcloud Richdocuments to version 3.8.6 or higher (for versions prior to 4.0.0) or version 4.2.3 or higher (for versions between 4.0.0 and 4.2.3).