Skip to content

Command Injection as root in NextCloudPi web panel

Critical
theCalcaholic published GHSA-m597-72v7-j982 Mar 29, 2024

Package

NextCloudPi

Affected versions

<=1.53.0

Patched versions

1.53.1

Description

Impact

A command injection vulnerability in NextCloudPi allows command execution as the root user via the NextCloudPi web-panel. Due to a security misconfiguration this can be used by anyone with access to NextCloudPi web-panel, no authentication is required.

Patches

It is recommended that the NextCloudPi is upgraded to 1.53.1

Workarounds

  • Ensure that the NextCloudPi web-panel is not exposed to the internet (the default) or other untrusted or public networks

Severity

Critical
10.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE ID

CVE-2024-30247

Weaknesses

No CWEs

Credits