Nextcloud Web Page Remote Code Execution Vulnerability
lib/Controller/ExtractionController.php in the Extract add-on before 1.2.0 for Nextcloud allows Remote Code Execution via shell metacharacters in a RAR filename via ajax/extractRar.php (nameOfFile and directory parameters).
The information has been provided by Alejandro Parodi
The original article can be found at: https://www.secsignal.org/news/a-tale-of-rce-nextcloud-extract-app/
Nextcloud Web Page is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
- Nextcloud Web Page before 1.2.0