First published: Mon Jul 12 2021(Updated: )
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <19.0.13 | |
Nextcloud Server | >=20.0.0<20.0.11 | |
Nextcloud Server | >=21.0.0<21.0.3 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32678 has a medium severity rating due to the potential for brute-force attacks on OCS API responses.
To fix CVE-2021-32678, update Nextcloud Server to version 19.0.13, 20.0.11, or 21.0.3 or higher.
CVE-2021-32678 affects Nextcloud Server versions prior to 19.0.13, 20.0.11, and 21.0.3.
The potential impacts of CVE-2021-32678 include increased susceptibility to brute-force attacks on the OCS API.
CVE-2021-32678 can be found in Nextcloud Server across multiple platforms, including Fedora versions 33 and 34.