Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-32688— Application specific tokens can change their own scope

CVSS 8.8 · High EPSS 3.11% · P87
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-32688

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Application specific tokens can change their own scope
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nextcloud 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nextcloud是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。 Nextcloud Server 存在安全漏洞,该漏洞源于Nextcloud Server缺乏权限检查,令牌能够在19.0.13、20.0.11和21.0.3之前的版本中更改它们自己的权限。攻击者可利用该漏洞导致文件系统限制令牌能够授予自己对文件系统的访问权。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nextcloudsecurity-advisories < 19.0.13 -

II. Public POCs for CVE-2021-32688

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-32688

登录查看更多情报信息。

Same Patch Batch · nextcloud · 2021-07-12 · 14 CVEs total

CVE-2021-326898.1 HIGHNextcloud Talk not properly disassociating users from chats after account deletion
CVE-2021-327267.1 HIGHWebauthn tokens not removed after user has been deleted
CVE-2021-327275.7 MEDIUMEnd-to-end encryption device setup did not verify public key
CVE-2021-327415.3 MEDIUMLack of ratelimit on public share link mount endpoint
CVE-2021-327055.3 MEDIUMLack of ratelimit on public DAV endpoint
CVE-2021-327035.3 MEDIUMLack of ratelimit on shareinfo endpoint
CVE-2021-327334.8 MEDIUMXSS in Nextcloud Text application
CVE-2021-327074.3 MEDIUMBypass of image blocking in Nextcloud Mail
CVE-2021-326783.7 LOWRatelimit not applied on OCS API responses
CVE-2021-327253.5 LOWDefault share permissions not respected for federated reshares
CVE-2021-326793.5 LOWFilenames not escaped by default in controllers using DownloadResponse
CVE-2021-326803.3 LOWAudit log is not properly logging unsetting of share expiration date
CVE-2021-327343.1 LOWFile path disclosure of shared files in Nextcloud Text application

IV. Related Vulnerabilities

V. Comments for CVE-2021-32688

No comments yet


Leave a comment