First published: Mon Jul 12 2021(Updated: )
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public DAV endpoint. This may have allowed an attacker to enumerate potentially valid share tokens or credentials. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <19.0.13 | |
Nextcloud Server | >=20.0.0<20.0.11 | |
Nextcloud Server | >=21.0.0<21.0.3 | |
Red Hat Fedora | =33 | |
Red Hat Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32705 has a medium severity level due to the potential for credential enumeration.
To fix CVE-2021-32705, upgrade your Nextcloud Server to version 19.0.13, 20.0.11 or above, or 21.0.3 or above.
Versions prior to 19.0.13, 20.0.11, and 21.0.3 of Nextcloud Server are affected by CVE-2021-32705.
Yes, CVE-2021-32705 can allow an attacker to enumerate valid share tokens or credentials due to lack of ratelimiting.
Currently, updating to the patched versions is the recommended and primary mitigation for CVE-2021-32705.