Vulnerability Details : CVE-2022-41882
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. In version 3.6.0, if a user received a malicious file share and has it synced locally or the virtual filesystem enabled and clicked a nc://open/ link it will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. "vbs", is being executed. It is recommended that the Nextcloud Desktop client is upgraded to version 3.6.1. As a workaround, users can block the Nextcloud Desktop client 3.6.0 by setting the `minimum.supported.desktop.version` system config to `3.6.1` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used. Another workaround would be to enforce shares to be accepted by setting the `sharing.force_share_accept` system config to `true` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused.
Products affected by CVE-2022-41882
- cpe:2.3:a:nextcloud:desktop:3.6.0:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-41882
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-41882
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
6.6
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L |
0.8
|
5.3
|
GitHub, Inc. |
CWE ids for CVE-2022-41882
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2022-41882
-
https://github.com/nextcloud/desktop/pull/5039
Bugfix/check token for edit locally requests by mgallien · Pull Request #5039 · nextcloud/desktop · GitHubPatch;Third Party Advisory
-
https://github.com/nextcloud/desktop/releases/tag/v3.6.1
Release Release 3.6.1 · nextcloud/desktop · GitHubRelease Notes;Third Party Advisory
-
https://github.com/nextcloud/server/pull/34559
Require token for local editing by nickvergessen · Pull Request #34559 · nextcloud/server · GitHubPatch;Third Party Advisory
-
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3w86-rm38-8w63
Desktop client can be tricked into opening/executing local files when clicking a nc://open/ link · Advisory · nextcloud/security-advisories · GitHubThird Party Advisory
Jump to