Vulnerabilities > CVE-2021-32800 - Unspecified vulnerability in Nextcloud Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
NONE Summary
Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
Vulnerable Configurations
References
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v
- https://github.com/nextcloud/server/pull/28078
- https://github.com/nextcloud/server/pull/28078
- https://hackerone.com/reports/1271052
- https://hackerone.com/reports/1271052
- https://security.gentoo.org/glsa/202208-17
- https://security.gentoo.org/glsa/202208-17