Nextcloud

Note!!! Приглядитесь к репортам на h1, некоторым вулнам не назначали cve

1.Recon

find version

https://target/status.php

find api

https://target/ocs-provider/

Nextcloud Detection

nuclei -u target -t nextcloud-detect.yaml

2.Exploit

brureforce api

https://target/public.php/webdav
https://target/remote.php/dav/files/USERNAME/

Nextcloud Exposed Installation

nuclei -u target -t nextcloud-install.yaml

3. Recommend

disable the web-based upgrader simply set 'upgrade.disable-web' => true, in nextcloud’s config.php with this result:

4. Reports

Nextcloud program at HackerOne

  1. Missing ownership check on remote wipe endpoint to Nextcloud - 127 upvotes, $500

  2. Remote Code Execution via Extract App Plugin to Nextcloud - 121 upvotes, $0

  3. Re-Sharing allows increase of privileges to Nextcloud - 90 upvotes, $750

  4. User deletion is not handled properly everywhere to Nextcloud - 75 upvotes, $1000

  5. Arbitrary SQL command injection to Nextcloud - 73 upvotes, $500

  6. Stored XSS in collabora via user name to Nextcloud - 48 upvotes, $0

  7. Two-factor authentication enforcement bypass to Nextcloud - 46 upvotes, $750

  8. [Reflected XSS] In Request URL to Nextcloud - 37 upvotes, $50

  9. Cross site scripting - XSRF Token to Nextcloud - 32 upvotes, $0

  10. I am because bug to Nextcloud - 29 upvotes, $0

  11. Reflected XSS in error pages (NC-SA-2017-008) to Nextcloud - 28 upvotes, $450

  12. Code injection in macOS Desktop Client to Nextcloud - 28 upvotes, $250

  13. Persistent XSS via filename in projects to Nextcloud - 23 upvotes, $150

refrencess

Last updated