Vulnerability Name: | CVE-2021-41239 (CCN-221294) | ||||||||||||
Assigned: | 2021-09-15 | ||||||||||||
Published: | 2022-03-08 | ||||||||||||
Updated: | 2022-10-24 | ||||||||||||
Summary: | Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds. | ||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-41239 Source: XF Type: UNKNOWN nextcloud-cve202141239-info-disc(221294) Source: CCN Type: Nextcloud GIT Repository User enumeration setting not obeyed in User Status API Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/issues/27122 Source: MISC Type: Patch, Third Party Advisory https://github.com/nextcloud/server/pull/29260 Source: GENTOO Type: Third Party Advisory GLSA-202208-17 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |