First published: Tue Sep 07 2021(Updated: )
Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users unable to upgrade it is recommended that the Richdocuments application be disabled.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Richdocuments | <3.8.4 | |
Nextcloud Richdocuments | >=4.0.0<4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37629 is a vulnerability in Nextcloud Richdocuments that allows an attacker to enumerate potentially valid share tokens.
The severity of CVE-2021-37629 is medium, with a CVSS score of 5.3.
An attacker can exploit CVE-2021-37629 by exploiting the lack of rate limiting on the Richdocuments OCS endpoint to enumerate potentially valid share tokens.
To fix the CVE-2021-37629 vulnerability, it is recommended to upgrade the Nextcloud Richdocuments app to a version higher than 4.2.1.
You can find more information about CVE-2021-37629 in the following references: - [GitHub Pull Request](https://github.com/nextcloud/richdocuments/pull/1663) - [Nextcloud Security Advisories](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gvvr-h36p-8mjx) - [HackerOne Report](https://hackerone.com/reports/1258750)