Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | Third Party Advisory |
https://hackerone.com/reports/1271052 | Permissions Required Third Party Advisory |
https://github.com/nextcloud/server/pull/28078 | Patch Third Party Advisory |
https://security.gentoo.org/glsa/202208-17 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-09-07 15:15
Updated : 2022-09-27 07:18
NVD link : CVE-2021-32800
Mitre link : CVE-2021-32800
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
nextcloud
- nextcloud_server