CVE-2021-32800

Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v - Third Party Advisory () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v - Third Party Advisory
References () https://github.com/nextcloud/server/pull/28078 - Patch, Third Party Advisory () https://github.com/nextcloud/server/pull/28078 - Patch, Third Party Advisory
References () https://hackerone.com/reports/1271052 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1271052 - Permissions Required, Third Party Advisory
References () https://security.gentoo.org/glsa/202208-17 - Third Party Advisory () https://security.gentoo.org/glsa/202208-17 - Third Party Advisory

Information

Published : 2021-09-07 22:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32800

Mitre link : CVE-2021-32800

CVE.ORG link : CVE-2021-32800


JSON object : View

Products Affected

nextcloud

  • nextcloud_server
CWE
CWE-306

Missing Authentication for Critical Function