Vulnerability Description
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Richdocuments app. An attacker was able to read arbitrary files in such a share. It is recommended that the Nextcloud Richdocuments is upgraded to 3.8.4 or 4.2.1. If upgrading is not possible then it is recommended to disable the Richdocuments application.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nextcloud | Richdocuments | < 3.8.4 |
Related Weaknesses (CWE)
References
- https://github.com/nextcloud/richdocuments/pull/1664PatchThird Party Advisory
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-9Third Party Advisory
- https://hackerone.com/reports/1253403Permissions RequiredThird Party Advisory
- https://github.com/nextcloud/richdocuments/pull/1664PatchThird Party Advisory
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxhh-9Third Party Advisory
- https://hackerone.com/reports/1253403Permissions RequiredThird Party Advisory
FAQ
What is CVE-2021-37628?
CVE-2021-37628 is a vulnerability with a CVSS score of 7.5 (HIGH). Nextcloud Richdocuments is an open source collaborative office suite. In affected versions the File Drop features ("Upload Only" public link shares in Nextcloud) can be bypassed using the Nextcloud Ri...
How severe is CVE-2021-37628?
CVE-2021-37628 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-37628?
Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Richdocuments.