Hello,
I’m investigating two admin audit log entries from our Nextcloud instance (v28.0.6.2) involving two different user accounts, and I’m trying to determine if this could be a case of unauthorized access.
Both logs occurred just a few seconds apart and originate from the same internal IP address (172.29.8.209
), which raised the following concern:
Could it be that user A somehow impersonated user B or accessed their files without proper authorization? Or is this more likely just a regular access via a public share link?
Here are the two entries:
From user A:
{"reqId":"[redacted]","level":1,"time":"2024-06-18T17:10:21+02:00","remoteAddr":"172.29.8.209","user":"--","app":"admin_audit","method":"GET","url":"/index.php/s/[token]","message":"The shared file with the token \"[token]\" by \"[UUID-1]\" has been accessed.","userAgent":"[browser info]","version":"28.0.6.2","data":{"app":"admin_audit"}}
From user B:
{"reqId":"[redacted]","level":1,"time":"2024-06-18T17:10:24+02:00","remoteAddr":"172.29.8.209","user":"--","app":"admin_audit","method":"POST","url":"/index.php/apps/richdocuments/token","message":"File accessed: \"/[UUID-2]/files/[path]/Sidel - Octeville-sur-Mer.pdf\"","userAgent":"[browser info]","version":"28.0.6.2","data":{"app":"admin_audit"}}
My specific questions are:
- Could this timing and shared IP suggest that user A accessed user B’s files by impersonating them?
- Or is this expected behavior when accessing a file through a public share link (token-based)?
- What exactly does the UUID in the first log entry (e.g.,
"UUID-1"
) refer to? Is it the internal user ID of the sharing user?
Thanks a lot for your insights — we want to make sure there hasn’t been any misuse or misconfiguration.