CVE-2021-32654

Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to receive write/read privileges on any Federated File Share. Since public links can be added as federated file share, this can also be exploited on any public link. Users can upgrade to patched versions (19.0.11, 20.0.10 or 21.0.2) or, as a workaround, disable federated file sharing.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
CVSS v2 : 6.4
v3 : 9.1
v2 : 6.4
v3 : 8.1
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5 - Third Party Advisory () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5 - Third Party Advisory
References () https://hackerone.com/reports/1170024 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1170024 - Permissions Required, Third Party Advisory
References () https://security.gentoo.org/glsa/202208-17 - Third Party Advisory () https://security.gentoo.org/glsa/202208-17 - Third Party Advisory

Information

Published : 2021-06-01 21:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32654

Mitre link : CVE-2021-32654

CVE.ORG link : CVE-2021-32654


JSON object : View

Products Affected

nextcloud

  • nextcloud_server
CWE
CWE-639

Authorization Bypass Through User-Controlled Key