First published: Mon Jul 12 2021(Updated: )
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <19.0.13 | |
Nextcloud Server | >=20.0.0<20.0.11 | |
Nextcloud Server | >=21.0.0<21.0.3 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32688 is a vulnerability in Nextcloud Server that allows tokens to be granted to unauthorized applications.
CVE-2021-32688 allows unauthorized applications to obtain tokens for authentication purposes.
CVE-2021-32688 has a severity rating of 8.8 (high).
To fix CVE-2021-32688, it is recommended to update Nextcloud Server to a version that is not affected by the vulnerability.
Yes, you can find more information about CVE-2021-32688 at the following references: [link1], [link2], [link3].