| Vulnerability Name: | CVE-2021-22895 (CCN-203600) | ||||||||||||
| Assigned: | 2021-06-01 | ||||||||||||
| Published: | 2021-06-01 | ||||||||||||
| Updated: | 2021-12-02 | ||||||||||||
| Summary: | Nextcloud Desktop Client before 3.3.1 is vulnerable to improper certificate validation due to lack of SSL certificate verification when using the "Register with a Provider" flow. | ||||||||||||
| CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-295 | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-22895 Source: XF Type: UNKNOWN nextcloud-cve202122895-sec-bypass(203600) Source: MISC Type: Patch, Third Party Advisory https://github.com/nextcloud/desktop/pull/2926 Source: MISC Type: Release Notes, Third Party Advisory https://github.com/nextcloud/desktop/releases/tag/v3.1.3 Source: CCN Type: Nextcloud GIT Repository SSL certificate was not validated in Provider Registration Flow Source: MISC Type: Third Party Advisory https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpgp-vf4p-wcw5 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://hackerone.com/reports/903424 Source: DEBIAN Type: Third Party Advisory DSA-4974 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||