Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-37629— Lack of ratelimit on Richdocuments OCS endpoint in nextcloud

CVSS 5.3 · Medium EPSS 0.38% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-37629

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Lack of ratelimit on Richdocuments OCS endpoint in nextcloud
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users unable to upgrade it is recommended that the Richdocuments application be disabled.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nextcloud 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nextcloud是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。 Nextcloud Richdocuments存在信息泄露漏洞,该漏洞源于在受影响的版本中,Richdocuments OCS端点没有速率限制。这可能允许攻击者可利用该漏洞枚举潜在的有效共享令牌。建议将Nextcloud Richdocuments应用升级到3.8.4或4.2.1来解决。对于无法升级的用户,建议禁用Richdocuments应用程序。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nextcloudsecurity-advisories < 3.8.4 -

II. Public POCs for CVE-2021-37629

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-37629

登录查看更多情报信息。

Same Patch Batch · nextcloud · 2021-09-07 · 9 CVEs total

CVE-2021-328029.3 CRITICALPreview generation used third-party library not suited for user-generated content in Nextc
CVE-2021-328008.1 HIGHBypass of Two Factor Authentication in Nextcloud server
CVE-2021-376287.5 HIGHFile Drop can be bypassed using Richdocuments app in nextcloud
CVE-2021-376306.5 MEDIUMSecret Circle can be joined without approval in Nextcloud Circles
CVE-2021-376316.5 MEDIUMCircle can be accessed by non-Circle members in Nextcloud Deck
CVE-2021-327825.8 MEDIUMCross-Site Scripting in Nextcloud Circles
CVE-2021-328015.5 MEDIUMExceptions may have logged Encryption-at-Rest key content in Nextcloud server
CVE-2021-327665.3 MEDIUMNextcloud Text app can disclose existence of folders in "File Drop" link share

IV. Related Vulnerabilities

V. Comments for CVE-2021-37629

No comments yet


Leave a comment