Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation. Reference: https://nextcloud.com/security/advisory/?id=NC-SA-2021-008 Upstream patch: https://github.com/nextcloud/desktop/pull/2906
Created nextcloud-client tracking bugs for this issue: Affects: epel-8 [bug 1950120] Affects: fedora-all [bug 1950119]