First published: Tue Mar 08 2022(Updated: )
Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <20.0.14 | |
Nextcloud Server | >=21.0.0<21.0.6 | |
Nextcloud Server | =22.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41239 is considered a moderate severity vulnerability as it allows user enumeration under certain conditions.
To fix CVE-2021-41239, update Nextcloud Server to a version later than 20.0.14, and for versions 21.x, ensure you are on 21.0.6 or higher.
Nextcloud versions from 20.0.0 to 20.0.14 and versions 21.0.0 to 21.0.6 are affected by CVE-2021-41239, along with version 22.2.0.
CVE-2021-41239 compromises the user enumeration settings, allowing unauthorized users to enumerate other users in the Nextcloud instance.
CVE-2021-41239 is not classified as critical but poses a risk by allowing user enumeration which could lead to further exploits.