Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | Third Party Advisory |
https://github.com/nextcloud/server/pull/28078 | Patch Third Party Advisory |
https://hackerone.com/reports/1271052 | Permissions Required Third Party Advisory |
https://security.gentoo.org/glsa/202208-17 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-09-07 22:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-32800
Mitre link : CVE-2021-32800
CVE.ORG link : CVE-2021-32800
JSON object : View
Products Affected
nextcloud
- nextcloud_server
CWE
CWE-306
Missing Authentication for Critical Function