CVE-2021-32800
Summary
| CVE | CVE-2021-32800 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-07 22:15:00 UTC |
| Updated | 2022-09-27 14:18:00 UTC |
| Description | Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| HackerOne |
MISC |
hackerone.com |
|
| Nextcloud: Multiple Vulnerabilities (GLSA 202208-17) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| Improve provider check by LukasReschke · Pull Request #28078 · nextcloud/server · GitHub |
MISC |
github.com |
|
| Bypass of Two Factor Authentication · Advisory · nextcloud/security-advisories · GitHub |
CONFIRM |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710590 Gentoo Linux Nextcloud Multiple Vulnerabilities (GLSA 202208-17)
- 751131 OpenSUSE Security Update for nextcloud (openSUSE-SU-2021:1253-1)