Insufficient File Type Validation in Nextcloud Contacts by Nextcloud
CVE-2020-8181

4.3MEDIUM

Key Information:

Vendor

Nextcloud

Vendor
CVE Published:
10 July 2020

What is CVE-2020-8181?

A vulnerability in Nextcloud Contacts version 3.2.0 stems from a lack of proper file type validation, allowing attackers to upload arbitrary files as avatars. This oversight poses a risk, potentially leading to further exploitation. Malicious users could leverage this flaw to bypass security restrictions, increasing the chance of harmful file execution and data compromise. It is essential for users of Nextcloud Contacts to review the security advisory and update to mitigate such vulnerabilities.

Affected Version(s)

Nextcloud Contact 3.3.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2020-8181 : Insufficient File Type Validation in Nextcloud Contacts by Nextcloud