A code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/622170 | Exploit Third Party Advisory |
| https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 | Broken Link Vendor Advisory |
| https://security.gentoo.org/glsa/202009-09 | Third Party Advisory |
| https://hackerone.com/reports/622170 | Exploit Third Party Advisory |
| https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 | Broken Link Vendor Advisory |
| https://security.gentoo.org/glsa/202009-09 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://hackerone.com/reports/622170 - Exploit, Third Party Advisory | |
| References | () https://nextcloud.com/security/advisory/?id=NC-SA-2020-030 - Broken Link, Vendor Advisory | |
| References | () https://security.gentoo.org/glsa/202009-09 - Third Party Advisory |
24 May 2022, 17:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | (GENTOO) https://security.gentoo.org/glsa/202009-09 - Third Party Advisory |
Information
Published : 2020-08-10 14:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8224
Mitre link : CVE-2020-8224
CVE.ORG link : CVE-2020-8224
JSON object : View
Products Affected
nextcloud
- desktop
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
