Nextcloud Server Remote Command Execution
Team Summary
Official summary from Nextcloud
While we appreciate the reporter's enthusiasm we'd like to note that the code is only called with hard-coded values and trusted input. Until now the reporter has failed to provide us with a proof of concept for this issue. The fact that a function can take input and actually evaluates it is by itself not a security risk unless user input is passed to this function. Which we fail to see here looking at https://github.com/search?q=user%3Anextcloud+findBinaryPath&type=Code&utf8=%E2%9C%93 As the reporter claimed to have requested a CVE identifier for this issue ([CVE-2017-6959](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6959)) we have publicly disclosed this issue to dispute this CVE. ------ **Update:** [The CVE has been rejected.](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6959)
Vulnerability Details
Technical details and impact analysis
Report Details
Additional information and metadata
State
Closed
Substate
Not-Applicable