Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-32689— Nextcloud Talk not properly disassociating users from chats after account deletion

CVSS 8.1 · High EPSS 0.26% · P49
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-32689

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Nextcloud Talk not properly disassociating users from chats after account deletion
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nextcloud Talk is a fully on-premises audio/video and chat communication service. In versions prior to 11.2.2, if a user was able to reuse an earlier used username, they could get access to any chat message sent to the previous user with this username. The issue was patched in versions 11.2.2 and 11.3.0. As a workaround, don't allow users to choose usernames themselves. This is the default behaviour of Nextcloud, but some user providers may allow doing so.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
不正确的属主授予
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nextcloud Talk 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nextcloud Talk是德国Nextcloud公司的一款自托管的本地音频/视频和聊天通信服务。 Nextcloud Talk 11.2.2之前版本存在安全漏洞,该漏洞源于如果用户能够重用以前使用过的用户名,他们就可以访问发送给之前使用该用户名的任何聊天消息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nextcloudsecurity-advisories < 11.2.2 -

II. Public POCs for CVE-2021-32689

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-32689

登录查看更多情报信息。

Same Patch Batch · nextcloud · 2021-07-12 · 14 CVEs total

CVE-2021-326888.8 HIGHApplication specific tokens can change their own scope
CVE-2021-327267.1 HIGHWebauthn tokens not removed after user has been deleted
CVE-2021-327275.7 MEDIUMEnd-to-end encryption device setup did not verify public key
CVE-2021-327415.3 MEDIUMLack of ratelimit on public share link mount endpoint
CVE-2021-327055.3 MEDIUMLack of ratelimit on public DAV endpoint
CVE-2021-327035.3 MEDIUMLack of ratelimit on shareinfo endpoint
CVE-2021-327334.8 MEDIUMXSS in Nextcloud Text application
CVE-2021-327074.3 MEDIUMBypass of image blocking in Nextcloud Mail
CVE-2021-326783.7 LOWRatelimit not applied on OCS API responses
CVE-2021-327253.5 LOWDefault share permissions not respected for federated reshares
CVE-2021-326793.5 LOWFilenames not escaped by default in controllers using DownloadResponse
CVE-2021-326803.3 LOWAudit log is not properly logging unsetting of share expiration date
CVE-2021-327343.1 LOWFile path disclosure of shared files in Nextcloud Text application

IV. Related Vulnerabilities

V. Comments for CVE-2021-32689

No comments yet


Leave a comment