Nextcloud Talk Android <17.0.0 - Intent Injection Allows FILE Write
CVE-2023-39957 Published on August 10, 2023
Path traversal allows tricking the Talk Android app into writing files into it's root directory
Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available.
Weakness Type
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2023-39957 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2023-39957
Want to know whenever a new CVE is published for Nextcloud Talk? stack.watch will email you.
Affected Versions
nextcloud security-advisories:- Version < 17.0.0 is affected.
- Before 17.0.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.