Vulnerability Name: | CVE-2021-32800 (CCN-208905) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-09-06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-09-06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-09-27 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-306 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32800 Source: XF Type: UNKNOWN nextcloud-cve202132800-sec-bypass(208905) Source: CCN Type: Nextcloud GIT Repository Bypass of Two Factor Authentication Source: CONFIRM Type: Third Party Advisory https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v Source: MISC Type: Patch, Third Party Advisory https://github.com/nextcloud/server/pull/28078 Source: MISC Type: Permissions Required, Third Party Advisory https://hackerone.com/reports/1271052 Source: GENTOO Type: Third Party Advisory GLSA-202208-17 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |