Possibility to force an admin to install recommended applications

Disclosed: 2022-04-29 11:50:18 By igorpyan To nextcloud
Low
Vulnerability Details
## Summary: Endpoint /nextcloud/index.php/core/apps/recommended is accessible via GET http method and doesn't check anti-csrf token. If an admin visits this endpoint in a browser the process of installation of recommended applications begins immediately. ## Steps To Reproduce: 1. an attacker creates a malicious page on controlled domain 1. an attacker enforce an admin to visit this page 1. an admin visits this page 1. applications will be installed in a while ## Affected version: nextcloud/server: 22.2.2 (at least) ## Recommendation: require requesttoken for this GET query or you can change behaviour so to initiate the installation process by manual click (POST query with checking of requesttoken) ## [attachment / reference] {F1517676} ## Impact Increasing of attack surface. Any unused plugins should be disabled or removed. But this way allows to install them.
Actions
View on HackerOne
Report Stats
  • Report ID: 1403614
  • State: Closed
  • Substate: resolved
  • Upvotes: 8
Share this report