CVE-2021-32678
12.07.2021, 13:15
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist.Enginsight
Vendor | Product | Version |
---|---|---|
nextcloud | nextcloud_server | 𝑥 < 19.0.13 |
nextcloud | nextcloud_server | 20.0.0 ≤ 𝑥 < 20.0.11 |
nextcloud | nextcloud_server | 21.0.0 ≤ 𝑥 < 21.0.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-799 - Improper Control of Interaction FrequencyThe software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests.
- CWE-307 - Improper Restriction of Excessive Authentication AttemptsThe product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.
References