Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Nextcloud Text app can disclose existence of folders in "File Drop" link share
Vulnerability Description
Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
通过错误消息导致的信息暴露
Vulnerability Title
Nextcloud 安全漏洞
Vulnerability Description
Nextcloud是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。 Nextcloud Text 存在安全漏洞,该漏洞源于在受影响的版本中,Nextcloud Text 应用程序返回不同的错误消息,具体取决于公共链接共享中是否存在文件夹。如果公共链接共享是使用“仅上传”权限创建的,则这是有问题的。 (又名“文件删除”)。链接共享收件人不会看到“文件放置”共享中存在哪些文件夹或文件。使用此漏洞,攻击者能够枚举此类共享中的文件夹。漏洞利用要求攻击者有权访问有效的受影响的“文件删除”
CVSS Information
N/A
Vulnerability Type
N/A