Nextcloud server before 19.0.11, 20.0.10, 21.0.2 is vulnerable to brute force attacks due to lack of inclusion of IPv6 subnets in rate-limiting considerations. This could potentially result in an attacker bypassing rate-limit controls such as the Nextcloud brute-force protection.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/1154003 - Permissions Required, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGXGR6HYGQ6MZXISMJEHCOXRGRFRUFMA/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S/ - | |
References | () https://nextcloud.com/security/advisory/?id=NC-SA-2021-009 - Broken Link |
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-06-11 16:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22915
Mitre link : CVE-2021-22915
CVE.ORG link : CVE-2021-22915
JSON object : View
Products Affected
fedoraproject
- fedora
nextcloud
- nextcloud_server
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts