First published: Thu Mar 10 2022(Updated: )
Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <20.0.14 | |
Nextcloud Server | >=21.0.0<21.0.6 | |
Nextcloud Server | >=22.2.0<22.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41233 has a moderate severity level due to potential unauthorized access to folder names.
To resolve CVE-2021-41233, update your Nextcloud Server to a version beyond 20.0.14, or above 21.0.6 or 22.2.1.
CVE-2021-41233 affects Nextcloud Server versions up to 20.0.14 and versions between 21.0.0 and 21.0.6, as well as between 22.2.0 and 22.2.1.
Yes, an attacker can exploit CVE-2021-41233 remotely to gain access to file drop folder names.
Currently, the best practice is to upgrade to a patched version of Nextcloud Server to mitigate CVE-2021-41233.