First published: Fri Nov 11 2022(Updated: )
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. In version 3.6.0, if a user received a malicious file share and has it synced locally or the virtual filesystem enabled and clicked a nc://open/ link it will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. "vbs", is being executed. It is recommended that the Nextcloud Desktop client is upgraded to version 3.6.1. As a workaround, users can block the Nextcloud Desktop client 3.6.0 by setting the `minimum.supported.desktop.version` system config to `3.6.1` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used. Another workaround would be to enforce shares to be accepted by setting the `sharing.force_share_accept` system config to `true` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Desktop | =3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41882 is a vulnerability in the Nextcloud Desktop Client that allows an attacker to execute arbitrary code on a user's computer.
CVE-2022-41882 has a severity rating of 7.8 out of 10, indicating a high severity.
Version 3.6.0 of the Nextcloud Desktop Client is affected by CVE-2022-41882.
To fix CVE-2022-41882, upgrade to version 3.6.1 of the Nextcloud Desktop Client.
You can find more information about CVE-2022-41882 in the following references: [Reference 1](https://github.com/nextcloud/desktop/pull/5039), [Reference 2](https://github.com/nextcloud/desktop/releases/tag/v3.6.1), [Reference 3](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3w86-rm38-8w63).