7.5

CVE-2021-37628

File Drop can be bypassed using Richdocuments app in nextcloud

File Drop can be bypassed using Richdocuments app

Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
Mögliche Gegenmaßnahme
Richdocuments: Disable the Richdocuments application.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudRichdocuments Version < 3.8.4
NextcloudRichdocuments Version >= 4.0.0 < 4.2.1
Weitere Schwachstelleninformationen
SystemNextcloud App
Produkt Richdocuments
Version >= 0.0.0, < 3.8.4
Version >= 4.2.0, < 4.2.1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.36% 0.581
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
security-advisories@github.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.