[Bug]: CalDAV/CardDAV sync fails with app password when file access is disabled – results in HTTP 503
⚠️ This issue respects the following points: ⚠️
- [x] This is a bug, not a question or a configuration/webserver/proxy issue.
- [x] This issue is not already reported on Github OR Nextcloud Community Forum (I've searched it).
- [x] Nextcloud Server is up to date. See Maintenance and Release Schedule for supported versions.
- [x] I agree to follow Nextcloud's Code of Conduct.
Bug description
Since the latest major version of Nextcloud (v31), CalDAV and CardDAV synchronization using an app password no longer works when file access is disabled for that specific app password.
This issue appears consistently and leads to a 503 Service Unavailable server error.
Notes:
- This issue did not exist in previous versions of Nextcloud (v30 and lower).
- The problem seems to be related to a change in permission handling introduced in the latest release.
- A temporary workaround is to re-enable file access, but this defeats the purpose of having scoped access.
Expected behavior: The CalDAV/CardDAV sync should work independently of the file access setting.
Actual behavior: The sync fails completely and the server returns an HTTP 503 error.
Steps to reproduce
- Go to Security settings in your user account.
- Create a new app password.
- In the access restrictions, disable file access.
- Use this app password to connect a CalDAV/CardDAV client (e.g. Thunderbird, DAVx⁵, iOS, etc.).
- Attempt synchronization.
Expected behavior
The CalDAV/CardDAV sync should work independently of the file access setting.
Nextcloud Server version
31
Operating system
Debian/Ubuntu
PHP engine version
PHP 8.3
Web server
Apache (supported)
Database engine version
MariaDB
Is this bug present after an update or on a fresh install?
Upgraded to a MAJOR version (ex. 31 to 32)
Are you using the Nextcloud Server Encryption module?
Encryption is Enabled
What user-backends are you using?
- [x] Default user-backend (database)
- [ ] LDAP/ Active Directory
- [ ] SSO - SAML
- [ ] Other
Configuration report
{
"system": {
"instanceid": "***REMOVED SENSITIVE VALUE***",
"passwordsalt": "***REMOVED SENSITIVE VALUE***",
"secret": "***REMOVED SENSITIVE VALUE***",
"trusted_domains": [
"***REMOVED SENSITIVE VALUE***"
],
"datadirectory": "***REMOVED SENSITIVE VALUE***",
"dbtype": "mysql",
"version": "31.0.2.1",
"overwrite.cli.url": "https:\/\/***REMOVED SENSITIVE VALUE***",
"htaccess.RewriteBase": "\/",
"dbname": "***REMOVED SENSITIVE VALUE***",
"dbhost": "***REMOVED SENSITIVE VALUE***",
"dbport": "",
"dbtableprefix": "oc_",
"mysql.utf8mb4": true,
"dbuser": "***REMOVED SENSITIVE VALUE***",
"dbpassword": "***REMOVED SENSITIVE VALUE***",
"installed": true,
"mail_smtpmode": "smtp",
"mail_sendmailmode": "smtp",
"mail_from_address": "***REMOVED SENSITIVE VALUE***",
"mail_domain": "***REMOVED SENSITIVE VALUE***",
"mail_smtphost": "***REMOVED SENSITIVE VALUE***",
"mail_smtpauth": 1,
"mail_smtpname": "***REMOVED SENSITIVE VALUE***",
"mail_smtppassword": "***REMOVED SENSITIVE VALUE***",
"mail_smtpport": "587",
"twofactor_enforced": "true",
"twofactor_enforced_groups": [],
"twofactor_enforced_excluded_groups": [],
"defaultapp": "files",
"loglevel": 4,
"loglevel_frontend": 4,
"memcache.local": "\\OC\\Memcache\\APCu",
"auth.bruteforce.protection.enabled": true,
"versions_retention_obligation": "auto, 30",
"default_language": "de",
"default_locale": "de_DE",
"force_language": "de",
"force_locale": "de_DE",
"knowledgebaseenabled": false,
"allow_user_to_change_display_name": false,
"theme": "",
"enforce_theme": "dark",
"appcodechecker": true,
"integrity.check.disabled": false,
"default_phone_region": "DE",
"filelocking.enabled": true,
"share_folder": "***REMOVED SENSITIVE VALUE***",
"maintenance": false,
"enable_avatars": false,
"token_auth_forced": true,
"hide_login_form": true,
"check_for_working_wellknown_setup": false,
"check_for_working_htaccess": true,
"check_data_directory_permissions": true,
"login_form_autocomplete": false,
"profile.enabled": false,
"activity_expire_days": 10,
"auth.webauthn.enabled": false,
"data-fingerprint": "***REMOVED SENSITIVE VALUE***",
"maintenance_window_start": 1,
"remember_login_cookie_lifetime": 0,
"appsallowlist": [
"files_reminders",
"password_policy",
"files_sharing",
"activity",
"dav",
"files_trashbin",
"suspicious_login",
"viewer",
"files_versions",
"provisioning_api",
"bruteforcesettings",
"federatedfilesharing",
"firstrunwizard",
"tasks",
"workflowengine",
"calendar",
"logreader",
"text",
"files",
"lookup_server_connector",
"theming",
"cloud_federation_api",
"files_accesscontrol",
"nextcloud_announcements",
"settings",
"twofactor_backupcodes",
"notifications",
"sharebymail",
"twofactor_totp",
"contacts",
"files_pdfviewer",
"oauth2",
"spreed",
"updatenotification"
],
"lost_password_link": "disabled",
"appstoreenabled": false,
"config_is_read_only": true,
"app_install_overwrite": [
"tasks"
]
}
}
List of activated Apps
Enabled:
- activity: 4.0.0
- admin_audit: 1.21.0
- app_api: 5.0.2
- bruteforcesettings: 4.0.0
- calendar: 5.2.0
- cloud_federation_api: 1.14.0
- contacts: 7.0.4
- dav: 1.33.0
- encryption: 2.19.0
- federatedfilesharing: 1.21.0
- files: 2.3.1
- files_accesscontrol: 2.0.0
- files_downloadlimit: 4.0.0
- files_pdfviewer: 4.0.0
- files_sharing: 1.23.1
- files_trashbin: 1.21.0
- files_versions: 1.24.0
- logreader: 4.0.0
- lookup_server_connector: 1.19.0
- nextcloud_announcements: 3.0.0
- notifications: 4.0.0
- oauth2: 1.19.1
- password_policy: 3.0.0
- profile: 1.0.0
- provisioning_api: 1.21.0
- settings: 1.14.0
- spreed: 21.0.1
- suspicious_login: 9.0.1
- tasks: 0.16.1
- text: 5.0.0
- theming: 2.6.1
- twofactor_backupcodes: 1.20.0
- twofactor_totp: 13.0.0-dev.0
- updatenotification: 1.21.0
- viewer: 4.0.0
- webhook_listeners: 1.2.0
- workflowengine: 2.13.0
Disabled:
- circles: 31.0.0 (installed 28.0.0-dev)
- comments: 1.21.0 (installed 1.18.0)
- contactsinteraction: 1.12.0 (installed 1.9.0)
- dashboard: 7.11.0 (installed 7.8.0)
- federation: 1.21.0 (installed 1.18.0)
- files_external: 1.23.0
- files_reminders: 1.4.0 (installed 1.1.0)
- firstrunwizard: 4.0.0 (installed 2.17.0)
- photos: 4.0.0-dev.1 (installed 2.4.0)
- privacy: 3.0.0 (installed 1.12.0)
- recommendations: 4.0.0 (installed 2.0.0)
- related_resources: 2.0.0 (installed 1.3.0)
- serverinfo: 3.0.0 (installed 1.18.0)
- sharebymail: 1.21.0 (installed 1.18.0)
- support: 3.0.0 (installed 1.11.0)
- survey_client: 3.0.0 (installed 1.16.0)
- systemtags: 1.21.1 (installed 1.18.0)
- twofactor_nextcloud_notification: 5.0.0
- user_ldap: 1.22.0
- user_status: 1.11.0 (installed 1.8.1)
- weather_status: 1.11.0 (installed 1.8.0)
Nextcloud Signing status
No errors have been found.
Nextcloud Logs
***REMOVED SENSITIVE VALUE*** - - [02/Apr/2025:06:14:40 +0200] "OPTIONS /remote.php/dav/principals/users/***REMOVED SENSITIVE VALUE***/ HTTP/2.0" 503 1418 "-" "macOS/15.4 AddressBookCore/2695.500.71"
Additional info
Same issue with differen OS like iOS, NodeRed, Windows, Ubuntu/Linux, ...
I have exactly the same problem after upgrading from Nextcloud 30.0.11 to 31.0.5.
It seems that when logging in via WebDAV the encryption app also tries to setup the encryption keys. If filesystem access is disabled, the encryption app thinks that there are no encryption keys yet and tries to setup new ones, which fails since filesystem access is not allowed.
The problem seems to start with the following commit: https://github.com/nextcloud/server/commit/47e7be5af88b395b0788f4a0da6f49a536dbb438 I manually commented out the event registration, which fixes the issue for me. However, this is only a workaround. I think that the encryption app should explicitly check, if filesystem access is allowed before doing any setup. Maybe @susnux (commit author) could take a look at it.
This is the workaround I applied which temporarily solves the problem for me:
--- apps/encryption/lib/AppInfo/Application.php.orig 2025-06-11 02:31:44.941892896 +0200
+++ apps/encryption/lib/AppInfo/Application.php 2025-06-12 19:29:17.407733608 +0200
@@ -90,7 +90,7 @@
$eventDispatcher->addServiceListener(PasswordUpdatedEvent::class, UserEventsListener::class);
$eventDispatcher->addServiceListener(BeforePasswordResetEvent::class, UserEventsListener::class);
$eventDispatcher->addServiceListener(PasswordResetEvent::class, UserEventsListener::class);
- $eventDispatcher->addServiceListener(UserLoggedInEvent::class, UserEventsListener::class);
+// $eventDispatcher->addServiceListener(UserLoggedInEvent::class, UserEventsListener::class);
$eventDispatcher->addServiceListener(UserLoggedInWithCookieEvent::class, UserEventsListener::class);
$eventDispatcher->addServiceListener(UserLoggedOutEvent::class, UserEventsListener::class);
}
Here is a more detailed error log:
{
"reqId": "CRB2ktNcEYJZIg25QCe2",
"level": 3,
"time": "2025-06-12T17:05:37+00:00",
"remoteAddr": "*** IP manually replaced ***",
"user": "*** username manually replaced ***",
"app": "no app in context",
"method": "PROPFIND",
"url": "/remote.php/dav/calendars/*** username manually replaced ***/personal/",
"message": "This request is not allowed to access the filesystem",
"userAgent": "Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Thunderbird/128.10.1",
"version": "31.0.5.1",
"exception": {
"Exception": "OC\\ForbiddenException",
"Message": "This request is not allowed to access the filesystem",
"Code": 0,
"Trace": [
{
"file": "/var/www/html/lib/private/Files/View.php",
"line": 1210,
"function": "mkdir",
"class": "OC\\Lockdown\\Filesystem\\NullStorage",
"type": "->",
"args": [
"files_encryption"
]
},
{
"file": "/var/www/html/lib/private/Files/View.php",
"line": 211,
"function": "basicOperation",
"class": "OC\\Files\\View",
"type": "->",
"args": [
"mkdir",
"/*** username manually replaced ***/files_encryption",
[
"create",
"write"
]
]
},
{
"file": "/var/www/html/lib/private/Encryption/Keys/Storage.php",
"line": 442,
"function": "mkdir",
"class": "OC\\Files\\View",
"type": "->",
"args": [
"/*** username manually replaced ***/files_encryption"
]
},
{
"file": "/var/www/html/lib/private/Encryption/Keys/Storage.php",
"line": 315,
"function": "keySetPreparation",
"class": "OC\\Encryption\\Keys\\Storage",
"type": "->",
"args": [
"/*** username manually replaced ***/files_encryption/OC_DEFAULT_MODULE"
]
},
{
"file": "/var/www/html/lib/private/Encryption/Keys/Storage.php",
"line": 107,
"function": "setKey",
"class": "OC\\Encryption\\Keys\\Storage",
"type": "->",
"args": [
"/*** username manually replaced ***/files_encryption/OC_DEFAULT_MODULE/*** username manually replaced ***.publicKey",
{
"key": "*** key manually replaced ***",
"uid": "*** sensitive parameters replaced ***"
}
]
},
{
"file": "/var/www/html/apps/encryption/lib/KeyManager.php",
"line": 235,
"function": "setUserKey",
"class": "OC\\Encryption\\Keys\\Storage",
"type": "->",
"args": [
"*** sensitive parameters replaced ***",
"publicKey",
"-----BEGIN PUBLIC KEY-----\n*** key manually replaced ***\n-----END PUBLIC KEY-----\n",
"OC_DEFAULT_MODULE"
]
},
{
"file": "/var/www/html/apps/encryption/lib/KeyManager.php",
"line": 194,
"function": "setPublicKey",
"class": "OCA\\Encryption\\KeyManager",
"type": "->",
"args": [
"*** sensitive parameters replaced ***",
"-----BEGIN PUBLIC KEY-----\n*** key manually replaced ***\n-----END PUBLIC KEY-----\n"
]
},
{
"file": "/var/www/html/apps/encryption/lib/Users/Setup.php",
"line": 29,
"function": "storeKeyPair",
"class": "OCA\\Encryption\\KeyManager",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/apps/encryption/lib/Listeners/UserEventsListener.php",
"line": 81,
"function": "setupUser",
"class": "OCA\\Encryption\\Users\\Setup",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/apps/encryption/lib/Listeners/UserEventsListener.php",
"line": 55,
"function": "onUserLogin",
"class": "OCA\\Encryption\\Listeners\\UserEventsListener",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/lib/private/EventDispatcher/ServiceEventListener.php",
"line": 68,
"function": "handle",
"class": "OCA\\Encryption\\Listeners\\UserEventsListener",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/3rdparty/symfony/event-dispatcher/EventDispatcher.php",
"line": 220,
"function": "__invoke",
"class": "OC\\EventDispatcher\\ServiceEventListener",
"type": "->",
"args": [
"*** sensitive parameters replaced ***",
"OCP\\User\\Events\\UserLoggedInEvent",
{
"__class__": "Symfony\\Component\\EventDispatcher\\EventDispatcher"
}
]
},
{
"file": "/var/www/html/3rdparty/symfony/event-dispatcher/EventDispatcher.php",
"line": 56,
"function": "callListeners",
"class": "Symfony\\Component\\EventDispatcher\\EventDispatcher",
"type": "->",
"args": [
[
{
"__class__": "Closure"
},
{
"__class__": "Closure"
}
],
"OCP\\User\\Events\\UserLoggedInEvent",
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/lib/private/EventDispatcher/EventDispatcher.php",
"line": 67,
"function": "dispatch",
"class": "Symfony\\Component\\EventDispatcher\\EventDispatcher",
"type": "->",
"args": [
"*** sensitive parameters replaced ***",
"OCP\\User\\Events\\UserLoggedInEvent"
]
},
{
"file": "/var/www/html/lib/private/EventDispatcher/EventDispatcher.php",
"line": 79,
"function": "dispatch",
"class": "OC\\EventDispatcher\\EventDispatcher",
"type": "->",
"args": [
"OCP\\User\\Events\\UserLoggedInEvent",
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/lib/private/Server.php",
"line": 529,
"function": "dispatchTyped",
"class": "OC\\EventDispatcher\\EventDispatcher",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"function": "OC\\{closure}",
"class": "OC\\Server",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/lib/private/Hooks/EmitterTrait.php",
"line": 88,
"function": "call_user_func_array",
"args": [
{
"__class__": "Closure"
},
[
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***"
]
]
},
{
"file": "/var/www/html/lib/private/Hooks/PublicEmitter.php",
"line": 22,
"function": "emit",
"class": "OC\\Hooks\\BasicEmitter",
"type": "->",
"args": [
"\\OC\\User",
"postLogin",
[
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***"
]
]
},
{
"file": "/var/www/html/lib/private/User/Session.php",
"line": 350,
"function": "emit",
"class": "OC\\Hooks\\PublicEmitter",
"type": "->",
"args": [
"\\OC\\User",
"postLogin",
[
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***",
"*** sensitive parameters replaced ***"
]
]
},
{
"file": "/var/www/html/lib/private/User/Session.php",
"line": 619,
"function": "completeLogin",
"class": "OC\\User\\Session",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/lib/private/User/Session.php",
"line": 305,
"function": "loginWithToken",
"class": "OC\\User\\Session",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/lib/private/User/Session.php",
"line": 405,
"function": "login",
"class": "OC\\User\\Session",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/apps/dav/lib/Connector/Sabre/Auth.php",
"line": 80,
"function": "logClientIn",
"class": "OC\\User\\Session",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Auth/Backend/AbstractBasic.php",
"line": 103,
"function": "validateUserPass",
"class": "OCA\\DAV\\Connector\\Sabre\\Auth",
"type": "->",
"args": [
"*** sensitive parameters replaced ***"
]
},
{
"file": "/var/www/html/apps/dav/lib/Connector/Sabre/Auth.php",
"line": 191,
"function": "check",
"class": "Sabre\\DAV\\Auth\\Backend\\AbstractBasic",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/apps/dav/lib/Connector/Sabre/Auth.php",
"line": 105,
"function": "auth",
"class": "OCA\\DAV\\Connector\\Sabre\\Auth",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Auth/Plugin.php",
"line": 179,
"function": "check",
"class": "OCA\\DAV\\Connector\\Sabre\\Auth",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Auth/Plugin.php",
"line": 135,
"function": "check",
"class": "Sabre\\DAV\\Auth\\Plugin",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/event/lib/WildcardEmitterTrait.php",
"line": 89,
"function": "beforeMethod",
"class": "Sabre\\DAV\\Auth\\Plugin",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Server.php",
"line": 456,
"function": "emit",
"class": "Sabre\\DAV\\Server",
"type": "->",
"args": [
"beforeMethod:PROPFIND",
[
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
]
},
{
"file": "/var/www/html/apps/dav/lib/Connector/Sabre/Server.php",
"line": 49,
"function": "invokeMethod",
"class": "Sabre\\DAV\\Server",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/apps/dav/lib/Server.php",
"line": 400,
"function": "start",
"class": "OCA\\DAV\\Connector\\Sabre\\Server",
"type": "->",
"args": []
},
{
"file": "/var/www/html/apps/dav/appinfo/v2/remote.php",
"line": 21,
"function": "exec",
"class": "OCA\\DAV\\Server",
"type": "->",
"args": []
},
{
"file": "/var/www/html/remote.php",
"line": 145,
"args": [
"/var/www/html/apps/dav/appinfo/v2/remote.php"
],
"function": "require_once"
}
],
"File": "/var/www/html/lib/private/Lockdown/Filesystem/NullStorage.php",
"Line": 24,
"message": "This request is not allowed to access the filesystem",
"exception": {},
"CustomMessage": "This request is not allowed to access the filesystem"
}
}
{
"reqId": "CRB2ktNcEYJZIg25QCe2",
"level": 3,
"time": "2025-06-12T17:05:37+00:00",
"remoteAddr": "*** IP manually replaced ***",
"user": "*** username manually replaced ***",
"app": "webdav",
"method": "PROPFIND",
"url": "/remote.php/dav/calendars/*** username manually replaced ***/personal/",
"message": "OC\\ForbiddenException: This request is not allowed to access the filesystem",
"userAgent": "Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Thunderbird/128.10.1",
"version": "31.0.5.1",
"exception": {
"Exception": "Sabre\\DAV\\Exception\\ServiceUnavailable",
"Message": "OC\\ForbiddenException: This request is not allowed to access the filesystem",
"Code": 0,
"Trace": [
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Auth/Plugin.php",
"line": 179,
"function": "check",
"class": "OCA\\DAV\\Connector\\Sabre\\Auth",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Auth/Plugin.php",
"line": 135,
"function": "check",
"class": "Sabre\\DAV\\Auth\\Plugin",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/event/lib/WildcardEmitterTrait.php",
"line": 89,
"function": "beforeMethod",
"class": "Sabre\\DAV\\Auth\\Plugin",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/3rdparty/sabre/dav/lib/DAV/Server.php",
"line": 456,
"function": "emit",
"class": "Sabre\\DAV\\Server",
"type": "->",
"args": [
"beforeMethod:PROPFIND",
[
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
]
},
{
"file": "/var/www/html/apps/dav/lib/Connector/Sabre/Server.php",
"line": 49,
"function": "invokeMethod",
"class": "Sabre\\DAV\\Server",
"type": "->",
"args": [
{
"__class__": "Sabre\\HTTP\\Request"
},
{
"__class__": "Sabre\\HTTP\\Response"
}
]
},
{
"file": "/var/www/html/apps/dav/lib/Server.php",
"line": 400,
"function": "start",
"class": "OCA\\DAV\\Connector\\Sabre\\Server",
"type": "->",
"args": []
},
{
"file": "/var/www/html/apps/dav/appinfo/v2/remote.php",
"line": 21,
"function": "exec",
"class": "OCA\\DAV\\Server",
"type": "->",
"args": []
},
{
"file": "/var/www/html/remote.php",
"line": 145,
"args": [
"/var/www/html/apps/dav/appinfo/v2/remote.php"
],
"function": "require_once"
}
],
"File": "/var/www/html/apps/dav/lib/Connector/Sabre/Auth.php",
"Line": 112,
"message": "OC\\ForbiddenException: This request is not allowed to access the filesystem",
"exception": {},
"CustomMessage": "OC\\ForbiddenException: This request is not allowed to access the filesystem"
}
}
This is still an issue with Nextcloud 31.0.7.
This is still an issue with Nextcloud 31.0.9.
Yes still exists and i can't relate why it's not fixed yet. :'( In my humble opinion it's a security issue as well.