CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
34.2%
After a user received a malicious file via a share and has it synced locally or the virtual filesystem enabled, being tricked into clicking a nc://open/ link will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. “vbs”, is being executed.
It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1
minimum.supported.desktop.version
system config to 3.6.1
on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used.sharing.force_share_accept
system config to true
on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused.If you have any questions or comments about this advisory: