Impact
A security issue was discovered in Reva that enables a malicious user to bypass the scope validation of a public link. That allows it to access resources outside the scope of a public link.
OpenCloud uses Reva as one of it's core components and thus it is affected.
Patches
Update to OpenCloud version >= 4.0.3 (stable release)
Update to OpenCloud version >= 5.0.2 (rolling release)
Workarounds
If you are unable to update immediately, please implement the following security configuration to disable public link shares temporarily until the final solution for this problem is rolled out.
Configuration Adjustment
- Docker Compose: Edit the docker-compose.yml and add
GATEWAY_STORAGE_PUBLIC_LINK_ENDPOINT=“” (empty string value) in the environment section of the opencloud container.
Verification of Mitigation
Execute the following test:
- Create a public link for testing.
- Open the link url in a private (no active login) browser tab.
- You should see an error page “unknown error”.
This configuration provides immediate protection and should be implemented immediately.
Configuration mitigation is available. It mitigates the problem completely.
References
No references yet
For more information
If you have any questions or comments about this advisory:
Impact
A security issue was discovered in Reva that enables a malicious user to bypass the scope validation of a public link. That allows it to access resources outside the scope of a public link.
OpenCloud uses Reva as one of it's core components and thus it is affected.
Patches
Update to OpenCloud version >= 4.0.3 (stable release)
Update to OpenCloud version >= 5.0.2 (rolling release)
Workarounds
If you are unable to update immediately, please implement the following security configuration to disable public link shares temporarily until the final solution for this problem is rolled out.
Configuration Adjustment
GATEWAY_STORAGE_PUBLIC_LINK_ENDPOINT=“”(empty string value) in theenvironmentsection of theopencloudcontainer.Verification of Mitigation
Execute the following test:
This configuration provides immediate protection and should be implemented immediately.
Configuration mitigation is available. It mitigates the problem completely.
References
No references yet
For more information
If you have any questions or comments about this advisory: