First published: Mon Oct 25 2021(Updated: )
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud OfficeOnline | <1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39224 is a vulnerability in Nextcloud OfficeOnline prior to version 1.1.1 that could result in a full path disclosure on shared files.
The severity of CVE-2021-39224 is medium with a CVSS score of 5.3.
CVE-2021-39224 can allow an attacker to see the full path of shared files, potentially exposing sensitive information.
To fix CVE-2021-39224, upgrade Nextcloud OfficeOnline to version 1.1.1 or later.
You can find more information about CVE-2021-39224 in the following references: [link1](https://github.com/nextcloud/officeonline/pull/204) [link2](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-56wm-r6jm-3v9h)