CVE-2021-39224

Source
https://cve.org/CVERecord?id=CVE-2021-39224
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39224.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-39224
Related
  • GHSA-56wm-r6jm-3v9h
Published
2021-10-25T22:15:07.577Z
Modified
2026-02-02T00:05:38.060509Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file shared.txt is located within /files/$username/Myfolder/Mysubfolder/shared.txt). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings.

References

Affected packages

Git / github.com/nextcloud/officeonline

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/officeonline
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.0.0-alpha1
v1.0.1
v1.0.2
v1.0.3
v1.1.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39224.json"