Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-32800— Bypass of Two Factor Authentication in Nextcloud server

CVSS 8.1 · High EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-32800

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Bypass of Two Factor Authentication in Nextcloud server
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nextcloud 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nextcloud是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。 Nextcloud server存在访问控制错误漏洞,该漏洞源于攻击者可利用该漏洞能够绕过Nextcloud中的双因素身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nextcloudsecurity-advisories < 20.0.12 -

II. Public POCs for CVE-2021-32800

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-32800

登录查看更多情报信息。

Same Patch Batch · nextcloud · 2021-09-07 · 9 CVEs total

CVE-2021-328029.3 CRITICALPreview generation used third-party library not suited for user-generated content in Nextc
CVE-2021-376287.5 HIGHFile Drop can be bypassed using Richdocuments app in nextcloud
CVE-2021-376306.5 MEDIUMSecret Circle can be joined without approval in Nextcloud Circles
CVE-2021-376316.5 MEDIUMCircle can be accessed by non-Circle members in Nextcloud Deck
CVE-2021-327825.8 MEDIUMCross-Site Scripting in Nextcloud Circles
CVE-2021-328015.5 MEDIUMExceptions may have logged Encryption-at-Rest key content in Nextcloud server
CVE-2021-327665.3 MEDIUMNextcloud Text app can disclose existence of folders in "File Drop" link share
CVE-2021-376295.3 MEDIUMLack of ratelimit on Richdocuments OCS endpoint in nextcloud

IV. Related Vulnerabilities

V. Comments for CVE-2021-32800

No comments yet


Leave a comment