Nextcloud server before 19.0.11, 20.0.10, 21.0.2 is vulnerable to brute force attacks due to lack of inclusion of IPv6 subnets in rate-limiting considerations. This could potentially result in an attacker bypassing rate-limit controls such as the Nextcloud brute-force protection.
References
Link | Resource |
---|---|
https://nextcloud.com/security/advisory/?id=NC-SA-2021-009 | Broken Link |
https://hackerone.com/reports/1154003 | Permissions Required Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGXGR6HYGQ6MZXISMJEHCOXRGRFRUFMA/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-06-11 09:15
Updated : 2021-09-20 06:51
NVD link : CVE-2021-22915
Mitre link : CVE-2021-22915
JSON object : View
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
Products Affected
fedoraproject
- fedora
nextcloud
- nextcloud_server