CVE-2021-32688
12.07.2021, 14:15
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.Enginsight
Vendor | Product | Version |
---|---|---|
nextcloud | nextcloud_server | 𝑥 < 19.0.13 |
nextcloud | nextcloud_server | 20.0.0 ≤ 𝑥 < 20.0.11 |
nextcloud | nextcloud_server | 21.0.0 ≤ 𝑥 < 21.0.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-285 - Improper AuthorizationThe software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
- CWE-552 - Files or Directories Accessible to External PartiesThe product makes files or directories accessible to unauthorized actors, even though they should not be.
References