Arch Linux alert ASA-202102-7 (nextcloud)
From: | Remi Gacogne via arch-security <arch-security@lists.archlinux.org> | |
To: | arch-security@archlinux.org | |
Subject: | [ASA-202102-7] nextcloud: directory traversal | |
Date: | Fri, 12 Feb 2021 08:03:15 +0100 | |
Message-ID: | <67f3eb31-6145-879d-e6b4-4fafe90d3286@archlinux.org> | |
Cc: | Remi Gacogne <rgacogne@archlinux.org> |
Arch Linux Security Advisory ASA-202102-7 ========================================= Severity: Medium Date : 2021-02-06 CVE-ID : CVE-2020-36193 Package : nextcloud Type : directory traversal Remote : Yes Link : https://security.archlinux.org/AVG-1464 Summary ======= The package nextcloud before version 20.0.6-1 is vulnerable to directory traversal. Resolution ========== Upgrade to 20.0.6-1. # pacman -Syu "nextcloud>=20.0.6-1" The problem has been fixed upstream in version 20.0.6. Workaround ========== None. Description =========== Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. Impact ====== A remote attacker might be able to write files in arbitrary file system locations by uploading a crafted archive file that leads to directory traversal. References ========== https://pear.php.net/bugs/bug.php?id=27008 https://github.com/pear/Archive_Tar/commit/cde460582ff389... https://github.com/nextcloud/3rdparty/commit/870623778780... https://github.com/nextcloud/3rdparty/commit/4f95d388e088... https://security.archlinux.org/CVE-2020-36193