First published: Tue Jun 01 2021(Updated: )
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to convert a Files Drop link to a federated share. This causes an issue on the UI side of the sharing user. When the sharing user opens the sharing panel and tries to remove the "Create" privileges of this unexpected share, Nextcloud server would silently grant the share read privileges. The vulnerability is patched in versions 19.0.11, 20.0.10 and 21.0.2. No workarounds are known to exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | <19.0.11 | |
Nextcloud Nextcloud Server | >=20.0.0<20.0.10 | |
Nextcloud Nextcloud Server | >=21.0.0<21.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32655 has been classified as a medium severity vulnerability.
To fix CVE-2021-32655, upgrade Nextcloud Server to versions 19.0.11, 20.0.10, or 21.0.2 or later.
Exploitation of CVE-2021-32655 may allow an attacker to convert a Files Drop link to a federated share, affecting user sharing experiences.
CVE-2021-32655 affects Nextcloud Server versions prior to 19.0.11, 20.0.10, and 21.0.2.
There is no official workaround for CVE-2021-32655 other than applying the necessary updates.