Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9j2f-3rj3-wgpg

Опубликовано: 05 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8.2

Описание

OpenCloud Reva has a Public Link Exploit

Impact

A security issue was discovered in Reva based products that enables a malicious user to bypass the scope validation of a public link, allowing it to access resources outside the scope of a public link.

Details

Public link shares in OpenCloud are bound to a specific scope (usually a file or directory). Anonymous users accessing resources via this public link share are only allowed to access the share resource itself and, in case of a directory or space root, all child resources of it.

Due to a bug in the GRPC authorization middleware of the "Reva" component of OpenCloud a malicious user is able to bypass the scope verification. By exploiting this via the the "archiver" service this can be leveraged to create an archive (zip or tar-file) containing all resources that this creator of the public link has access to.

It is not possible to bypass the public link scope via "normal" WebDAV requests so it is not possible to exploit this vulnerability via WebDAV.

Patches

Update to OpenCloud Reva version >= 2.40.3 for the 2.40.x versions.
Update to OpenCloud Reva version >= 2.42.3 for the 2.41.x versions

Workarounds

There is no workaround because one cannot run Reva standalone from this project. Please check the OpenCloud Advisory how to mitigate the problem in an OpenCloud deployment via configuration.

For more information

If there are any questions or comments about this advisory:

Пакеты

Наименование

github.com/opencloud-eu/reva/v2

go
Затронутые версииВерсия исправления

<= 2.40.1

2.40.3

Наименование

github.com/opencloud-eu/reva/v2

go
Затронутые версииВерсия исправления

>= 2.41.0, < 2.42.3

2.42.3

8.2 High

CVSS3

Дефекты

CWE-22
CWE-863

8.2 High

CVSS3

Дефекты

CWE-22
CWE-863