Nextcloud Web Page Remote Code Execution Vulnerability

Summary

lib/Controller/ExtractionController.php in the Extract add-on before 1.2.0 for Nextcloud allows Remote Code Execution via shell metacharacters in a RAR filename via ajax/extractRar.php (nameOfFile and directory parameters).

Credit:

The information has been provided by Alejandro Parodi 
The original article can be found at:    https://www.secsignal.org/news/a-tale-of-rce-nextcloud-extract-app/


Details

Nextcloud Web Page is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

Vulnerable Systems:

  •  Nextcloud Web Page before 1.2.0

    CVE Information:
    CVE-2019-12739

    Disclosure Timeline:
    Publish Date:06/05/2019

    Categories: News