First published: Fri Mar 31 2023(Updated: )
Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Richdocuments | >=6.0.0<6.3.2 | |
Nextcloud Richdocuments | >=7.0.0<7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2023-28645 is a bypass of the secure view feature in the Nextcloud richdocuments app.
The severity of CVE-2023-28645 is medium.
The vulnerability CVE-2023-28645 affects Nextcloud Richdocuments versions 6.0.0 to 6.3.2 and 7.0.0 to 7.0.2.
To fix the vulnerability CVE-2023-28645, it is recommended to update to a version of Nextcloud Richdocuments that is not affected by the vulnerability.
More information about the vulnerability CVE-2023-28645 can be found in the Nextcloud documentation and the Nextcloud security advisories.