user can bypass password enforcement when federated sharing is enabled
N
Nextcloud
Submitted None
Actions:
Reported by
michag86
Vulnerability Details
Technical details and impact analysis
If the admin forces password for link shares and federated shares are enabled, users can bypass this enforcement. Tested with Nextcloud 18.0.3
Steps to reproduce:
- enable password enforcement for link shares as admin
- as user1 create a link share with password
- open the link share in a separate browser session and enter the password
- use "add to your nextcloud" and add the file to another nextcloud or the same nextcloud with another user.
- login as user1, now there is a new link share without password protection. The gui shows that password is enforced, but the link has no password protection
- copy the new created link
Additional information:
I think the problem is, that if the share is added by "add to your nextcloud", the wrong share_type is set. federated shares normally use the value 6, but the value 3 is set.
Additional problem:
Users can bruteforce link-ids. okay this is something that takes a long time because of 62^15 combinations. But if a forced password is used, every try is protected by the brute-force protection. Just testing links isn't protected by the bruteforce protection I think. Maybe someone just gets read access to the database (or a backup of this). In this case all federated shares are leaked.
So, if password is forced for link shares, enabling federated shares will lower the security level.
Why is there no additional password or public/private-keypair used for establishing and accessing federated shares?
## Impact
This is something that can be used by registered users to bypass the sharing policy.
An attacker that gets read access to the database can access all federated shares.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$250.00