First published: Fri Jun 11 2021(Updated: )
Nextcloud server before 19.0.11, 20.0.10, 21.0.2 is vulnerable to brute force attacks due to lack of inclusion of IPv6 subnets in rate-limiting considerations. This could potentially result in an attacker bypassing rate-limit controls such as the Nextcloud brute-force protection.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | <19.0.11 | |
Nextcloud Nextcloud Server | >=20.0.0<20.0.10 | |
Nextcloud Nextcloud Server | >=21.0.0<21.0.2 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22915 is considered a moderate severity vulnerability due to its potential for allowing brute-force attacks.
To fix CVE-2021-22915, upgrade to Nextcloud server version 19.0.11, 20.0.10, or 21.0.2 or later.
CVE-2021-22915 is associated with brute force attacks that exploit the lack of IPv6 subnet rate-limiting.
CVE-2021-22915 affects Nextcloud server versions prior to 19.0.11, 20.0.10, and 21.0.2.
Yes, CVE-2021-22915 specifically impacts users leveraging IPv6 due to inadequate rate limiting in Nextcloud.