Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-32678


Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist.


Published

2021-07-12T13:15:07.923

Last Modified

2024-11-21T06:07:30.853

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.7 (LOW)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-799
  • Type: Primary
    CWE-307

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application nextcloud nextcloud_server < 19.0.13 Yes
Application nextcloud nextcloud_server < 20.0.11 Yes
Application nextcloud nextcloud_server < 21.0.3 Yes
Operating System fedoraproject fedora 33 Yes
Operating System fedoraproject fedora 34 Yes

References