Nextcloud Web Page Remote Code Execution Vulnerability


lib/Controller/ExtractionController.php in the Extract add-on before 1.2.0 for Nextcloud allows Remote Code Execution via shell metacharacters in a RAR filename via ajax/extractRar.php (nameOfFile and directory parameters).


The information has been provided by Alejandro Parodi 
The original article can be found at:


Nextcloud Web Page is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

Vulnerable Systems:

  •  Nextcloud Web Page before 1.2.0

    CVE Information:

    Disclosure Timeline:
    Publish Date:06/05/2019

    Categories: News