wp-mail-logging
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/wp-includes/functions.php on line 6114ninja-forms
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/wp-includes/functions.php on line 6114updraftplus
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/wp-includes/functions.php on line 6114rocket
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/wp-includes/functions.php on line 6114[vc_row][vc_column][vc_column_text] This page is constantly evolving. So check back over time to see new additions.<\/p>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<\/section>[\/vc_column_text][\/vc_column][\/vc_row][vc_section][vc_row equal_height=”yes” css=”.vc_custom_1662476609904{margin-bottom: 2rem !important;}”][vc_column][vc_column_text css=”.vc_custom_1665128736737{margin-bottom: 2rem !important;}”]<\/p>\r\n [\/vc_column_text][\/vc_column][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-user-lock” color=”custom” size=”lg” custom_color=”#0082c9″ css=”.vc_custom_1662476966895{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\n We consider Nextcloud administrators ultimately trusted. It is for example expected behavior that a Nextcloud administrator can execute arbitrary code.<\/p>\r\n [\/vc_column_text][\/vc_column][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-cogs” color=”custom” size=”lg” custom_color=”#0082c9″ css=”.vc_custom_1662530600195{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\n Due to the usage of the PHP scripting language we do consider Denial of Service not something that can at the moment be completely prevented. See also the article \u201cPHP Denial of Service Attack Revisited<\/a>\u201c.<\/p>\r\n [\/vc_column_text][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1662476615310{margin-top: 2rem !important;margin-bottom: 2rem !important;}”][vc_column width=”1\/4″][\/vc_column][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-certificate” color=”custom” size=”lg” align=”center” custom_color=”#0082c9″ css=”.vc_custom_1662536779734{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\n We do consider local mounted storage systems as trusted, so if a symlink or something else is configured on the external storage the Nextcloud server will follow it with the web server privileges.<\/p>\r\n For this reason we do recommend administrators to only use the external storage mount for ultimately trusted content.<\/p>\r\n [\/vc_column_text][\/vc_column][vc_column width=”1\/4″][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1662476619902{margin-top: 2rem !important;margin-bottom: 2rem !important;}”][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-server” color=”custom” size=”lg” custom_color=”#0082c9″ css=”.vc_custom_1662530722286{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\n Nextcloud can be configured to encrypt data at rest. This has two options: server-wide key (default since Nextcloud 13) or per-user key. With the former, the keys are on the server and thus the only protection offered is against external storage. With per-user keys, the keys are encrypted by the user password and handled as securely as possible, thus securing data when the user is not logged in. We are aware that a Nextcloud administrator could still intercept the user password to manually decrypt the encryption key. We do thus only consider attack scenarios bounty-worthy if they include an external storage vector or, with per-user-keys, data-at-rest.<\/p>\r\n [\/vc_column_text][\/vc_column][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-laptop” color=”custom” size=”lg” custom_color=”#0082c9″ css=”.vc_custom_1662530726331{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\n Nextcloud client-side (or end-to-end) encryption is designed to protect user data from the server in nearly all scenario\u2019s, as described in the RFC.<\/a> Any way to circumvent the protection as covered by the security properties<\/a> would be treated by us as a security issue. Note that, as of May 2018, the client-side or end-to-end encryption feature is not considered \u2018finished\u2019 and no bug bounties are paid out until it is released as a final, stable version, expected in 2020.<\/p>\r\n [\/vc_column_text][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1662477090190{margin-top: 2rem !important;margin-bottom: 2rem !important;}”][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-check-circle” color=”custom” size=”lg” custom_color=”#0082c9″ css=”.vc_custom_1662530770082{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\n Some features in Nextcloud are intentionally marked as insecure and disabled by default (plus have a big warning above them). One example includes the preview providers such as the LibreOffice preview provider. At the moment we consider vulnerabilities in those disabled features as not bounty-worthy.<\/p>\r\n [\/vc_column_text][\/vc_column][vc_column width=”1\/2″][vc_icon icon_fontawesome=”fas fa-check-circle” color=”custom” size=”lg” custom_color=”#0082c9″ css=”.vc_custom_1662530770082{margin-bottom: 15px !important;}”][vc_column_text]<\/p>\r\n [\/vc_column_text][vc_column_text]<\/p>\r\nThreat model & accepted risks<\/h1>
Administrator privileges<\/h4>\r\n
Denial of Service<\/h4>\r\n
Local external storage systems
are considered trusted<\/h4>\r\nServer-side encryption<\/h4>\r\n
Client-side encryption<\/h4>\r\n
Features intentionally marked as insecure<\/h4>\r\n
Audit logging<\/h4>\r\n