Nextcloud server software: Content Spoofing

Disclosed: 2016-07-19 10:30:00 By ishahriyar To nextcloud
Unknown
Vulnerability Details
In Nextcloud the "dir" parameter is vulnerable to content spoofing attack. If anyone puts a valid directory name in dir parameter then it goes that directory other wise it redirects to the home directory (/) By putting `../../` in dir parameter I was able to stop the redirect then I had put some messages after that and that messages reflected with the same given format. So here an attacker can send his messages directly through url. Poc link `http://192.168.0.118/nextcloud/index.php/apps/files/?dir=../../Welcome+to+Nexcloud+You+can+get+pro+account+by+navigating+this+example.com` Thanks.
Actions
View on HackerOne
Report Stats
  • Report ID: 145463
  • State: Closed
  • Substate: resolved
  • Upvotes: 2
Share this report