Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-32800 (GCVE-0-2021-32800)
Vulnerability from cvelistv5
- CWE-306 - Missing Authentication for Critical Function
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | Third Party Advisory | |
security-advisories@github.com | https://github.com/nextcloud/server/pull/28078 | Patch, Third Party Advisory | |
security-advisories@github.com | https://hackerone.com/reports/1271052 | Permissions Required, Third Party Advisory | |
security-advisories@github.com | https://security.gentoo.org/glsa/202208-17 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nextcloud/server/pull/28078 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1271052 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-17 | Third Party Advisory |
Vendor | Product | Version | ||
---|---|---|---|---|
nextcloud | security-advisories |
Version: < 20.0.12 Version: >= 21.0.0, < 21.0.4 Version: >= 22.0.0, < 22.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:56.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "security-advisories", "vendor": "nextcloud", "versions": [ { "status": "affected", "version": "\u003c 20.0.12" }, { "status": "affected", "version": "\u003e= 21.0.0, \u003c 21.0.4" }, { "status": "affected", "version": "\u003e= 22.0.0, \u003c 22.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-11T00:06:38", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "source": { "advisory": "GHSA-gv5w-8q25-785v", "discovery": "UNKNOWN" }, "title": "Bypass of Two Factor Authentication in Nextcloud server", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32800", "STATE": "PUBLIC", "TITLE": "Bypass of Two Factor Authentication in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.12" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.4" }, { "version_value": "\u003e= 22.0.0, \u003c 22.1.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "name": "https://github.com/nextcloud/server/pull/28078", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28078" }, { "name": "https://hackerone.com/reports/1271052", "refsource": "MISC", "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-gv5w-8q25-785v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32800", "datePublished": "2021-09-07T21:35:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:56.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-32800\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-09-07T22:15:08.417\",\"lastModified\":\"2024-11-21T06:07:46.070\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.\"},{\"lang\":\"es\",\"value\":\"El servidor Nextcloud es una nube personal de c\u00f3digo abierto y autoalojada. En las versiones afectadas, un atacante es capaz de omitir la autenticaci\u00f3n de dos factores en Nextcloud. As\u00ed, el conocimiento de una contrase\u00f1a, o el acceso a un dispositivo confiable WebAuthN de un usuario era suficiente para conseguir acceso a una cuenta. Es recomendado actualizar el servidor Nextcloud a versi\u00f3n 20.0.12, 21.0.4 o 22.1.0. No se presentan soluciones para esta vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.0.12\",\"matchCriteriaId\":\"68C08D05-1FEC-4A5B-8925-B8D910541CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.0.0\",\"versionEndExcluding\":\"21.0.4\",\"matchCriteriaId\":\"B1D99183-A99E-4C56-991A-D4287EEDFE79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.0.0\",\"versionEndExcluding\":\"22.1.0\",\"matchCriteriaId\":\"655A23FE-6908-4F26-878C-29F9F2D269A6\"}]}]}],\"references\":[{\"url\":\"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/nextcloud/server/pull/28078\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/1271052\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-17\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/nextcloud/server/pull/28078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/1271052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
fkie_cve-2021-32800
Vulnerability from fkie_nvd
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | Third Party Advisory | |
security-advisories@github.com | https://github.com/nextcloud/server/pull/28078 | Patch, Third Party Advisory | |
security-advisories@github.com | https://hackerone.com/reports/1271052 | Permissions Required, Third Party Advisory | |
security-advisories@github.com | https://security.gentoo.org/glsa/202208-17 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nextcloud/server/pull/28078 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hackerone.com/reports/1271052 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-17 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
nextcloud | nextcloud_server | * | |
nextcloud | nextcloud_server | * | |
nextcloud | nextcloud_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "68C08D05-1FEC-4A5B-8925-B8D910541CEE", "versionEndExcluding": "20.0.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1D99183-A99E-4C56-991A-D4287EEDFE79", "versionEndExcluding": "21.0.4", "versionStartIncluding": "21.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "655A23FE-6908-4F26-878C-29F9F2D269A6", "versionEndExcluding": "22.1.0", "versionStartIncluding": "22.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." }, { "lang": "es", "value": "El servidor Nextcloud es una nube personal de c\u00f3digo abierto y autoalojada. En las versiones afectadas, un atacante es capaz de omitir la autenticaci\u00f3n de dos factores en Nextcloud. As\u00ed, el conocimiento de una contrase\u00f1a, o el acceso a un dispositivo confiable WebAuthN de un usuario era suficiente para conseguir acceso a una cuenta. Es recomendado actualizar el servidor Nextcloud a versi\u00f3n 20.0.12, 21.0.4 o 22.1.0. No se presentan soluciones para esta vulnerabilidad" } ], "id": "CVE-2021-32800", "lastModified": "2024-11-21T06:07:46.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-07T22:15:08.417", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "source": "security-advisories@github.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1271052" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1271052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2021-102886
Vulnerability from cnvd
Title: Nextcloud server授权问题漏洞(CNVD-2021-102886)
Description:
Nextcloud server是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。
Nextcloud server在20.0.12, 21.0.4 or 22.1.0之前版本存在授权问题漏洞,该漏洞源于网络系统或产品中缺少身份验证措施或身份验证强度不足。攻击者可利用该漏洞能够绕过Nextcloud中的双因素身份验证。
Severity: 中
Patch Name: Nextcloud server授权问题漏洞(CNVD-2021-102886)的补丁
Patch Description:
Nextcloud server是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。
Nextcloud server在20.0.12, 21.0.4 or 22.1.0之前版本存在授权问题漏洞,该漏洞源于网络系统或产品中缺少身份验证措施或身份验证强度不足。攻击者可利用该漏洞能够绕过Nextcloud中的双因素身份验证。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v
Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-32800
Name | ['Nextcloud Nextcloud <20.0.12', 'Nextcloud Nextcloud <21.0.4', 'Nextcloud Nextcloud <22.1.0'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-32800", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-32800" } }, "description": "Nextcloud server\u662f\u5fb7\u56fdNextcloud\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u81ea\u6258\u7ba1\u6587\u4ef6\u540c\u6b65\u548c\u5171\u4eab\u7684\u901a\u4fe1\u5e94\u7528\u5e73\u53f0\u3002\n\nNextcloud server\u572820.0.12, 21.0.4 or 22.1.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u4e2d\u7f3a\u5c11\u8eab\u4efd\u9a8c\u8bc1\u63aa\u65bd\u6216\u8eab\u4efd\u9a8c\u8bc1\u5f3a\u5ea6\u4e0d\u8db3\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u80fd\u591f\u7ed5\u8fc7Nextcloud\u4e2d\u7684\u53cc\u56e0\u7d20\u8eab\u4efd\u9a8c\u8bc1\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-102886", "openTime": "2021-12-28", "patchDescription": "Nextcloud server\u662f\u5fb7\u56fdNextcloud\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u81ea\u6258\u7ba1\u6587\u4ef6\u540c\u6b65\u548c\u5171\u4eab\u7684\u901a\u4fe1\u5e94\u7528\u5e73\u53f0\u3002\r\n\r\nNextcloud server\u572820.0.12, 21.0.4 or 22.1.0\u4e4b\u524d\u7248\u672c\u5b58\u5728\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u4e2d\u7f3a\u5c11\u8eab\u4efd\u9a8c\u8bc1\u63aa\u65bd\u6216\u8eab\u4efd\u9a8c\u8bc1\u5f3a\u5ea6\u4e0d\u8db3\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u80fd\u591f\u7ed5\u8fc7Nextcloud\u4e2d\u7684\u53cc\u56e0\u7d20\u8eab\u4efd\u9a8c\u8bc1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Nextcloud server\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2021-102886\uff09\u7684\u8865\u4e01", "products": { "product": [ "Nextcloud Nextcloud \u003c20.0.12", "Nextcloud Nextcloud \u003c21.0.4", "Nextcloud Nextcloud \u003c22.1.0" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-32800", "serverity": "\u4e2d", "submitTime": "2021-09-09", "title": "Nextcloud server\u6388\u6743\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2021-102886\uff09" }
opensuse-su-2021:1255-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nextcloud", "title": "Title of the patch" }, { "category": "description", "text": "This update for nextcloud fixes the following issues:\n\nUpdate to 20.0.12\n\nFix boo#1190291 \n\n- CVE-2021-32766 (CWE-209): Generation of Error Message Containing Sensitive Information \n- CVE-2021-32800 (CWE-306): Missing Authentication for Critical Function \n- CVE-2021-32801 (CWE-532): Insertion of Sensitive Information into Log File \n- CVE-2021-32802 (CWE-829): Inclusion of Functionality from Untrusted Control Sphere \n\nChanges\n\n- Bump vue-router from 3.4.3 to 3.4.9 (server#27224)\n- Bump v-click-outside from 3.1.1 to 3.1.2 (server#27232)\n- Bump url-search-params-polyfill from 8.1.0 to 8.1.1 (server#27236)\n- Bump debounce from 1.2.0 to 1.2.1 (server#27646)\n- Bump vue and vue-template-compiler (server#27701)\n- Design fixes to app-settings button (server#27745)\n- Reset checksum when writing files to object store (server#27754)\n- Run s3 tests again (server#27804)\n- Fix in locking cache check (server#27829)\n- Bump dompurify from 2.2.8 to 2.2.9 (server#27836)\n- Make search popup usable on mobile, too (server#27858)\n- Cache images on browser (server#27863)\n- Fix dark theme on public link shares (server#27895)\n- Make user status usable on mobile (server#27897)\n- Do not escape display name in dashboard welcome text (server#27913)\n- Bump moment-timezone from 0.5.31 to 0.5.33 (server#27924)\n- Fix newfileMenu on public page (server#27941)\n- Fix svg icons disapearing in app navigation when text overflows (server#27955)\n- Bump bootstrap from 4.5.2 to 4.5.3 (server#27965)\n- Show registered breadcrumb detail views in breadcrumb menu (server#27970)\n- Fix regression in file sidebar (server#27976)\n- Bump exports-loader from 1.1.0 to 1.1.1 (server#27984)\n- Bump @nextcloud/capabilities from 1.0.2 to 1.0.4 (server#27985)\n- Bump @nextcloud/vue-dashboard from 1.0.0 to 1.0.1 (server#27988)\n- Improve notcreatable permissions hint (server#28006)\n- Update CRL due to revoked twofactor_nextcloud_notification.crt (server#28018)\n- Bump sass-loader from 10.0.2 to 10.0.5 (server#28032)\n- Increase footer height for longer menus (server#28045)\n- Mask password for Redis and RedisCluster on connection failure (server#28054)\n- Fix missing theming for login button (server#28065)\n- Fix overlapping of elements in certain views (server#28072)\n- Disable HEIC image preview provider for performance concerns (server#28081)\n- Improve provider check (server#28087)\n- Sanitize more functions from the encryption app (server#28091)\n- Hide download button for public preview of audio files (server#28096)\n- L10n: HTTP in capital letters (server#28107)\n- Fix dark theme in file exists dialog (server#28111)\n- Let memory limit set in tests fit the used amount (server#28125)\n- User management - Add icon to user groups (server#28172)\n- Bump marked from 1.1.1 to 1.1.2 (server#28187)\n- Fix variable override in file view (server#28191)\n- Bump regenerator-runtime from 0.13.7 to 0.13.9 (server#28207)\n- Bump url-loader from 4.1.0 to 4.1.1 (server#28208)\n- Fix Files breadcrumbs being hidden even if there is enough space (server#28224)\n- Dont apply jail search filter is on the root (server#28241)\n- Check that php was compiled with argon2 support or that the php-sodium extensions is installed (server#28289)\n- Fix preference name when generating notifications (activity#603)\n- Fix monochrome icon detection for correct dark mode invert (activity#607)\n- Fix \u0027Enable notification emails\u0027 (activity#613)\n- Show add, del and restored files within by and self filter (activity#616)\n- Link from app-navigation-settings to personal settings (activity#625)\n- Fix pdfviewer design (files_pdfviewer#446)\n- Include version number in firstrunwizard (firstrunwizard#570)\n- Use notification main link if no parameter has a link (notifications#1040)\n- Bump sass-loader from 10.1.0 to 10.1.1 (text#1360)\n- Bump @babel/plugin-transform-runtime from 7.13.9 to 7.13.15 (text#1548)\n- Bump @babel/preset-env from 7.13.9 to 7.13.15 (text#1550)\n- Bump vue-loader from 15.9.6 to 15.9.7 (text#1592)\n- Unify error responses and add logging where appropriate (text#1719)\n- Disable header timeout on mobile (viewer#978)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1255", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1255-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1255-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1255-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGLFYZROCOIJAG7C45FNC4EUIMNFJRIL/" }, { "category": "self", "summary": "SUSE Bug 1190291", "url": "https://bugzilla.suse.com/1190291" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32766 page", "url": "https://www.suse.com/security/cve/CVE-2021-32766/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32800 page", "url": "https://www.suse.com/security/cve/CVE-2021-32800/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32801 page", "url": "https://www.suse.com/security/cve/CVE-2021-32801/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32802 page", "url": "https://www.suse.com/security/cve/CVE-2021-32802/" } ], "title": "Security update for nextcloud", "tracking": { "current_release_date": "2021-09-14T10:21:06Z", "generator": { "date": "2021-09-14T10:21:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1255-1", "initial_release_date": "2021-09-14T10:21:06Z", "revision_history": [ { "date": "2021-09-14T10:21:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nextcloud-20.0.12-bp153.2.6.1.noarch", "product": { "name": "nextcloud-20.0.12-bp153.2.6.1.noarch", "product_id": "nextcloud-20.0.12-bp153.2.6.1.noarch" } }, { "category": "product_version", "name": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "product": { "name": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "product_id": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP3", "product": { "name": "SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3" } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nextcloud-20.0.12-bp153.2.6.1.noarch as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch" }, "product_reference": "nextcloud-20.0.12-bp153.2.6.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" }, "product_reference": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-20.0.12-bp153.2.6.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch" }, "product_reference": "nextcloud-20.0.12-bp153.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" }, "product_reference": "nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32766" } ], "notes": [ { "category": "general", "text": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32766", "url": "https://www.suse.com/security/cve/CVE-2021-32766" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32766", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:21:06Z", "details": "critical" } ], "title": "CVE-2021-32766" }, { "cve": "CVE-2021-32800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32800" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32800", "url": "https://www.suse.com/security/cve/CVE-2021-32800" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32800", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:21:06Z", "details": "critical" } ], "title": "CVE-2021-32800" }, { "cve": "CVE-2021-32801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32801" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32801", "url": "https://www.suse.com/security/cve/CVE-2021-32801" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32801", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:21:06Z", "details": "critical" } ], "title": "CVE-2021-32801" }, { "cve": "CVE-2021-32802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32802" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32802", "url": "https://www.suse.com/security/cve/CVE-2021-32802" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32802", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP3:nextcloud-20.0.12-bp153.2.6.1.noarch", "SUSE Package Hub 15 SP3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-20.0.12-bp153.2.6.1.noarch", "openSUSE Leap 15.3:nextcloud-apache-20.0.12-bp153.2.6.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:21:06Z", "details": "critical" } ], "title": "CVE-2021-32802" } ] }
opensuse-su-2021:1252-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nextcloud", "title": "Title of the patch" }, { "category": "description", "text": "This update for nextcloud fixes the following issues:\n\nUpdate to 20.0.12\n\nFixed security issues (boo#1190291):\n\n- CVE-2021-32766 (CWE-209): Generation of Error Message Containing Sensitive Information \n- CVE-2021-32800 (CWE-306): Missing Authentication for Critical Function \n- CVE-2021-32801 (CWE-532): Insertion of Sensitive Information into Log File \n- CVE-2021-32802 (CWE-829): Inclusion of Functionality from Untrusted Control Sphere \n\nChanges\n\n- Bump vue-router from 3.4.3 to 3.4.9 (server#27224)\n- Bump v-click-outside from 3.1.1 to 3.1.2 (server#27232)\n- Bump url-search-params-polyfill from 8.1.0 to 8.1.1 (server#27236)\n- Bump debounce from 1.2.0 to 1.2.1 (server#27646)\n- Bump vue and vue-template-compiler (server#27701)\n- Design fixes to app-settings button (server#27745)\n- Reset checksum when writing files to object store (server#27754)\n- Run s3 tests again (server#27804)\n- Fix in locking cache check (server#27829)\n- Bump dompurify from 2.2.8 to 2.2.9 (server#27836)\n- Make search popup usable on mobile, too (server#27858)\n- Cache images on browser (server#27863)\n- Fix dark theme on public link shares (server#27895)\n- Make user status usable on mobile (server#27897)\n- Do not escape display name in dashboard welcome text (server#27913)\n- Bump moment-timezone from 0.5.31 to 0.5.33 (server#27924)\n- Fix newfileMenu on public page (server#27941)\n- Fix svg icons disapearing in app navigation when text overflows (server#27955)\n- Bump bootstrap from 4.5.2 to 4.5.3 (server#27965)\n- Show registered breadcrumb detail views in breadcrumb menu (server#27970)\n- Fix regression in file sidebar (server#27976)\n- Bump exports-loader from 1.1.0 to 1.1.1 (server#27984)\n- Bump @nextcloud/capabilities from 1.0.2 to 1.0.4 (server#27985)\n- Bump @nextcloud/vue-dashboard from 1.0.0 to 1.0.1 (server#27988)\n- Improve notcreatable permissions hint (server#28006)\n- Update CRL due to revoked twofactor_nextcloud_notification.crt (server#28018)\n- Bump sass-loader from 10.0.2 to 10.0.5 (server#28032)\n- Increase footer height for longer menus (server#28045)\n- Mask password for Redis and RedisCluster on connection failure (server#28054)\n- Fix missing theming for login button (server#28065)\n- Fix overlapping of elements in certain views (server#28072)\n- Disable HEIC image preview provider for performance concerns (server#28081)\n- Improve provider check (server#28087)\n- Sanitize more functions from the encryption app (server#28091)\n- Hide download button for public preview of audio files (server#28096)\n- L10n: HTTP in capital letters (server#28107)\n- Fix dark theme in file exists dialog (server#28111)\n- Let memory limit set in tests fit the used amount (server#28125)\n- User management - Add icon to user groups (server#28172)\n- Bump marked from 1.1.1 to 1.1.2 (server#28187)\n- Fix variable override in file view (server#28191)\n- Bump regenerator-runtime from 0.13.7 to 0.13.9 (server#28207)\n- Bump url-loader from 4.1.0 to 4.1.1 (server#28208)\n- Fix Files breadcrumbs being hidden even if there is enough space (server#28224)\n- Dont apply jail search filter is on the root (server#28241)\n- Check that php was compiled with argon2 support or that the php-sodium extensions is installed (server#28289)\n- Fix preference name when generating notifications (activity#603)\n- Fix monochrome icon detection for correct dark mode invert (activity#607)\n- Fix \u0027Enable notification emails\u0027 (activity#613)\n- Show add, del and restored files within by and self filter (activity#616)\n- Link from app-navigation-settings to personal settings (activity#625)\n- Fix pdfviewer design (files_pdfviewer#446)\n- Include version number in firstrunwizard (firstrunwizard#570)\n- Use notification main link if no parameter has a link (notifications#1040)\n- Bump sass-loader from 10.1.0 to 10.1.1 (text#1360)\n- Bump @babel/plugin-transform-runtime from 7.13.9 to 7.13.15 (text#1548)\n- Bump @babel/preset-env from 7.13.9 to 7.13.15 (text#1550)\n- Bump vue-loader from 15.9.6 to 15.9.7 (text#1592)\n- Unify error responses and add logging where appropriate (text#1719)\n- Disable header timeout on mobile (viewer#978)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1252", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1252-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1252-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PSLXDEBLEPENTY4PS62BFVL7QHFQ2RC/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1252-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PSLXDEBLEPENTY4PS62BFVL7QHFQ2RC/" }, { "category": "self", "summary": "SUSE Bug 1190291", "url": "https://bugzilla.suse.com/1190291" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32766 page", "url": "https://www.suse.com/security/cve/CVE-2021-32766/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32800 page", "url": "https://www.suse.com/security/cve/CVE-2021-32800/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32801 page", "url": "https://www.suse.com/security/cve/CVE-2021-32801/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32802 page", "url": "https://www.suse.com/security/cve/CVE-2021-32802/" } ], "title": "Security update for nextcloud", "tracking": { "current_release_date": "2021-09-14T09:33:54Z", "generator": { "date": "2021-09-14T09:33:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1252-1", "initial_release_date": "2021-09-14T09:33:54Z", "revision_history": [ { "date": "2021-09-14T09:33:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nextcloud-20.0.12-31.1.noarch", "product": { "name": "nextcloud-20.0.12-31.1.noarch", "product_id": "nextcloud-20.0.12-31.1.noarch" } }, { "category": "product_version", "name": "nextcloud-apache-20.0.12-31.1.noarch", "product": { "name": "nextcloud-apache-20.0.12-31.1.noarch", "product_id": "nextcloud-apache-20.0.12-31.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nextcloud-20.0.12-31.1.noarch as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch" }, "product_reference": "nextcloud-20.0.12-31.1.noarch", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-apache-20.0.12-31.1.noarch as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" }, "product_reference": "nextcloud-apache-20.0.12-31.1.noarch", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32766" } ], "notes": [ { "category": "general", "text": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32766", "url": "https://www.suse.com/security/cve/CVE-2021-32766" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32766", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T09:33:54Z", "details": "critical" } ], "title": "CVE-2021-32766" }, { "cve": "CVE-2021-32800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32800" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32800", "url": "https://www.suse.com/security/cve/CVE-2021-32800" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32800", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T09:33:54Z", "details": "critical" } ], "title": "CVE-2021-32800" }, { "cve": "CVE-2021-32801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32801" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32801", "url": "https://www.suse.com/security/cve/CVE-2021-32801" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32801", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T09:33:54Z", "details": "critical" } ], "title": "CVE-2021-32801" }, { "cve": "CVE-2021-32802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32802" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32802", "url": "https://www.suse.com/security/cve/CVE-2021-32802" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32802", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nextcloud-20.0.12-31.1.noarch", "SUSE Package Hub 12:nextcloud-apache-20.0.12-31.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T09:33:54Z", "details": "critical" } ], "title": "CVE-2021-32802" } ] }
opensuse-su-2021:1250-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nextcloud", "title": "Title of the patch" }, { "category": "description", "text": "This update for nextcloud fixes the following issues:\n\nUpdate to 20.0.12\n\nFix boo#1190291:\n\n- CVE-2021-32766 (CWE-209): Generation of Error Message Containing Sensitive Information \n- CVE-2021-32800 (CWE-306): Missing Authentication for Critical Function \n- CVE-2021-32801 (CWE-532): Insertion of Sensitive Information into Log File \n- CVE-2021-32802 (CWE-829): Inclusion of Functionality from Untrusted Control Sphere \n\nChanges\n\n- Bump vue-router from 3.4.3 to 3.4.9 (server#27224)\n- Bump v-click-outside from 3.1.1 to 3.1.2 (server#27232)\n- Bump url-search-params-polyfill from 8.1.0 to 8.1.1 (server#27236)\n- Bump debounce from 1.2.0 to 1.2.1 (server#27646)\n- Bump vue and vue-template-compiler (server#27701)\n- Design fixes to app-settings button (server#27745)\n- Reset checksum when writing files to object store (server#27754)\n- Run s3 tests again (server#27804)\n- Fix in locking cache check (server#27829)\n- Bump dompurify from 2.2.8 to 2.2.9 (server#27836)\n- Make search popup usable on mobile, too (server#27858)\n- Cache images on browser (server#27863)\n- Fix dark theme on public link shares (server#27895)\n- Make user status usable on mobile (server#27897)\n- Do not escape display name in dashboard welcome text (server#27913)\n- Bump moment-timezone from 0.5.31 to 0.5.33 (server#27924)\n- Fix newfileMenu on public page (server#27941)\n- Fix svg icons disapearing in app navigation when text overflows (server#27955)\n- Bump bootstrap from 4.5.2 to 4.5.3 (server#27965)\n- Show registered breadcrumb detail views in breadcrumb menu (server#27970)\n- Fix regression in file sidebar (server#27976)\n- Bump exports-loader from 1.1.0 to 1.1.1 (server#27984)\n- Bump @nextcloud/capabilities from 1.0.2 to 1.0.4 (server#27985)\n- Bump @nextcloud/vue-dashboard from 1.0.0 to 1.0.1 (server#27988)\n- Improve notcreatable permissions hint (server#28006)\n- Update CRL due to revoked twofactor_nextcloud_notification.crt (server#28018)\n- Bump sass-loader from 10.0.2 to 10.0.5 (server#28032)\n- Increase footer height for longer menus (server#28045)\n- Mask password for Redis and RedisCluster on connection failure (server#28054)\n- Fix missing theming for login button (server#28065)\n- Fix overlapping of elements in certain views (server#28072)\n- Disable HEIC image preview provider for performance concerns (server#28081)\n- Improve provider check (server#28087)\n- Sanitize more functions from the encryption app (server#28091)\n- Hide download button for public preview of audio files (server#28096)\n- L10n: HTTP in capital letters (server#28107)\n- Fix dark theme in file exists dialog (server#28111)\n- Let memory limit set in tests fit the used amount (server#28125)\n- User management - Add icon to user groups (server#28172)\n- Bump marked from 1.1.1 to 1.1.2 (server#28187)\n- Fix variable override in file view (server#28191)\n- Bump regenerator-runtime from 0.13.7 to 0.13.9 (server#28207)\n- Bump url-loader from 4.1.0 to 4.1.1 (server#28208)\n- Fix Files breadcrumbs being hidden even if there is enough space (server#28224)\n- Dont apply jail search filter is on the root (server#28241)\n- Check that php was compiled with argon2 support or that the php-sodium extensions is installed (server#28289)\n- Fix preference name when generating notifications (activity#603)\n- Fix monochrome icon detection for correct dark mode invert (activity#607)\n- Fix \u0027Enable notification emails\u0027 (activity#613)\n- Show add, del and restored files within by and self filter (activity#616)\n- Link from app-navigation-settings to personal settings (activity#625)\n- Fix pdfviewer design (files_pdfviewer#446)\n- Include version number in firstrunwizard (firstrunwizard#570)\n- Use notification main link if no parameter has a link (notifications#1040)\n- Bump sass-loader from 10.1.0 to 10.1.1 (text#1360)\n- Bump @babel/plugin-transform-runtime from 7.13.9 to 7.13.15 (text#1548)\n- Bump @babel/preset-env from 7.13.9 to 7.13.15 (text#1550)\n- Bump vue-loader from 15.9.6 to 15.9.7 (text#1592)\n- Unify error responses and add logging where appropriate (text#1719)\n- Disable header timeout on mobile (viewer#978)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1250", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1250-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1250-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB2IJ2VSI6P5WFS6XKMPAPGT6545U4WN/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1250-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB2IJ2VSI6P5WFS6XKMPAPGT6545U4WN/" }, { "category": "self", "summary": "SUSE Bug 1190291", "url": "https://bugzilla.suse.com/1190291" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32766 page", "url": "https://www.suse.com/security/cve/CVE-2021-32766/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32800 page", "url": "https://www.suse.com/security/cve/CVE-2021-32800/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32801 page", "url": "https://www.suse.com/security/cve/CVE-2021-32801/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32802 page", "url": "https://www.suse.com/security/cve/CVE-2021-32802/" } ], "title": "Security update for nextcloud", "tracking": { "current_release_date": "2021-09-13T14:06:26Z", "generator": { "date": "2021-09-13T14:06:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1250-1", "initial_release_date": "2021-09-13T14:06:26Z", "revision_history": [ { "date": "2021-09-13T14:06:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nextcloud-20.0.12-bp151.3.18.1.noarch", "product": { "name": "nextcloud-20.0.12-bp151.3.18.1.noarch", "product_id": "nextcloud-20.0.12-bp151.3.18.1.noarch" } }, { "category": "product_version", "name": "nextcloud-apache-20.0.12-bp151.3.18.1.noarch", "product": { "name": "nextcloud-apache-20.0.12-bp151.3.18.1.noarch", "product_id": "nextcloud-apache-20.0.12-bp151.3.18.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP1", "product": { "name": "SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nextcloud-20.0.12-bp151.3.18.1.noarch as component of SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch" }, "product_reference": "nextcloud-20.0.12-bp151.3.18.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-apache-20.0.12-bp151.3.18.1.noarch as component of SUSE Package Hub 15 SP1", "product_id": "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" }, "product_reference": "nextcloud-apache-20.0.12-bp151.3.18.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32766" } ], "notes": [ { "category": "general", "text": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32766", "url": "https://www.suse.com/security/cve/CVE-2021-32766" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32766", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-13T14:06:26Z", "details": "critical" } ], "title": "CVE-2021-32766" }, { "cve": "CVE-2021-32800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32800" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32800", "url": "https://www.suse.com/security/cve/CVE-2021-32800" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32800", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-13T14:06:26Z", "details": "critical" } ], "title": "CVE-2021-32800" }, { "cve": "CVE-2021-32801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32801" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32801", "url": "https://www.suse.com/security/cve/CVE-2021-32801" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32801", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-13T14:06:26Z", "details": "critical" } ], "title": "CVE-2021-32801" }, { "cve": "CVE-2021-32802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32802" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32802", "url": "https://www.suse.com/security/cve/CVE-2021-32802" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32802", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP1:nextcloud-20.0.12-bp151.3.18.1.noarch", "SUSE Package Hub 15 SP1:nextcloud-apache-20.0.12-bp151.3.18.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-13T14:06:26Z", "details": "critical" } ], "title": "CVE-2021-32802" } ] }
opensuse-su-2021:1253-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nextcloud", "title": "Title of the patch" }, { "category": "description", "text": "This update for nextcloud fixes the following issues:\n\nUpdate to 20.0.12\n\nFix boo#1190291 \n\n- CVE-2021-32766 (CWE-209): Generation of Error Message Containing Sensitive Information \n- CVE-2021-32800 (CWE-306): Missing Authentication for Critical Function \n- CVE-2021-32801 (CWE-532): Insertion of Sensitive Information into Log File \n- CVE-2021-32802 (CWE-829): Inclusion of Functionality from Untrusted Control Sphere \n\nChanges:\n\n- Bump vue-router from 3.4.3 to 3.4.9 (server#27224)\n- Bump v-click-outside from 3.1.1 to 3.1.2 (server#27232)\n- Bump url-search-params-polyfill from 8.1.0 to 8.1.1 (server#27236)\n- Bump debounce from 1.2.0 to 1.2.1 (server#27646)\n- Bump vue and vue-template-compiler (server#27701)\n- Design fixes to app-settings button (server#27745)\n- Reset checksum when writing files to object store (server#27754)\n- Run s3 tests again (server#27804)\n- Fix in locking cache check (server#27829)\n- Bump dompurify from 2.2.8 to 2.2.9 (server#27836)\n- Make search popup usable on mobile, too (server#27858)\n- Cache images on browser (server#27863)\n- Fix dark theme on public link shares (server#27895)\n- Make user status usable on mobile (server#27897)\n- Do not escape display name in dashboard welcome text (server#27913)\n- Bump moment-timezone from 0.5.31 to 0.5.33 (server#27924)\n- Fix newfileMenu on public page (server#27941)\n- Fix svg icons disapearing in app navigation when text overflows (server#27955)\n- Bump bootstrap from 4.5.2 to 4.5.3 (server#27965)\n- Show registered breadcrumb detail views in breadcrumb menu (server#27970)\n- Fix regression in file sidebar (server#27976)\n- Bump exports-loader from 1.1.0 to 1.1.1 (server#27984)\n- Bump @nextcloud/capabilities from 1.0.2 to 1.0.4 (server#27985)\n- Bump @nextcloud/vue-dashboard from 1.0.0 to 1.0.1 (server#27988)\n- Improve notcreatable permissions hint (server#28006)\n- Update CRL due to revoked twofactor_nextcloud_notification.crt (server#28018)\n- Bump sass-loader from 10.0.2 to 10.0.5 (server#28032)\n- Increase footer height for longer menus (server#28045)\n- Mask password for Redis and RedisCluster on connection failure (server#28054)\n- Fix missing theming for login button (server#28065)\n- Fix overlapping of elements in certain views (server#28072)\n- Disable HEIC image preview provider for performance concerns (server#28081)\n- Improve provider check (server#28087)\n- Sanitize more functions from the encryption app (server#28091)\n- Hide download button for public preview of audio files (server#28096)\n- L10n: HTTP in capital letters (server#28107)\n- Fix dark theme in file exists dialog (server#28111)\n- Let memory limit set in tests fit the used amount (server#28125)\n- User management - Add icon to user groups (server#28172)\n- Bump marked from 1.1.1 to 1.1.2 (server#28187)\n- Fix variable override in file view (server#28191)\n- Bump regenerator-runtime from 0.13.7 to 0.13.9 (server#28207)\n- Bump url-loader from 4.1.0 to 4.1.1 (server#28208)\n- Fix Files breadcrumbs being hidden even if there is enough space (server#28224)\n- Dont apply jail search filter is on the root (server#28241)\n- Check that php was compiled with argon2 support or that the php-sodium extensions is installed (server#28289)\n- Fix preference name when generating notifications (activity#603)\n- Fix monochrome icon detection for correct dark mode invert (activity#607)\n- Fix \u0027Enable notification emails\u0027 (activity#613)\n- Show add, del and restored files within by and self filter (activity#616)\n- Link from app-navigation-settings to personal settings (activity#625)\n- Fix pdfviewer design (files_pdfviewer#446)\n- Include version number in firstrunwizard (firstrunwizard#570)\n- Use notification main link if no parameter has a link (notifications#1040)\n- Bump sass-loader from 10.1.0 to 10.1.1 (text#1360)\n- Bump @babel/plugin-transform-runtime from 7.13.9 to 7.13.15 (text#1548)\n- Bump @babel/preset-env from 7.13.9 to 7.13.15 (text#1550)\n- Bump vue-loader from 15.9.6 to 15.9.7 (text#1592)\n- Unify error responses and add logging where appropriate (text#1719)\n- Disable header timeout on mobile (viewer#978)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1253", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1253-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1253-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTAQAEILOXFUPY3SZFAMY4NQGD5OXQX3/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1253-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTAQAEILOXFUPY3SZFAMY4NQGD5OXQX3/" }, { "category": "self", "summary": "SUSE Bug 1190291", "url": "https://bugzilla.suse.com/1190291" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32766 page", "url": "https://www.suse.com/security/cve/CVE-2021-32766/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32800 page", "url": "https://www.suse.com/security/cve/CVE-2021-32800/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32801 page", "url": "https://www.suse.com/security/cve/CVE-2021-32801/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32802 page", "url": "https://www.suse.com/security/cve/CVE-2021-32802/" } ], "title": "Security update for nextcloud", "tracking": { "current_release_date": "2021-09-14T10:19:48Z", "generator": { "date": "2021-09-14T10:19:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1253-1", "initial_release_date": "2021-09-14T10:19:48Z", "revision_history": [ { "date": "2021-09-14T10:19:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nextcloud-20.0.12-lp152.3.12.1.noarch", "product": { "name": "nextcloud-20.0.12-lp152.3.12.1.noarch", "product_id": "nextcloud-20.0.12-lp152.3.12.1.noarch" } }, { "category": "product_version", "name": "nextcloud-apache-20.0.12-lp152.3.12.1.noarch", "product": { "name": "nextcloud-apache-20.0.12-lp152.3.12.1.noarch", "product_id": "nextcloud-apache-20.0.12-lp152.3.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nextcloud-20.0.12-lp152.3.12.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch" }, "product_reference": "nextcloud-20.0.12-lp152.3.12.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-apache-20.0.12-lp152.3.12.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" }, "product_reference": "nextcloud-apache-20.0.12-lp152.3.12.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32766" } ], "notes": [ { "category": "general", "text": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32766", "url": "https://www.suse.com/security/cve/CVE-2021-32766" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32766", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:19:48Z", "details": "critical" } ], "title": "CVE-2021-32766" }, { "cve": "CVE-2021-32800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32800" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32800", "url": "https://www.suse.com/security/cve/CVE-2021-32800" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32800", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:19:48Z", "details": "critical" } ], "title": "CVE-2021-32800" }, { "cve": "CVE-2021-32801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32801" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32801", "url": "https://www.suse.com/security/cve/CVE-2021-32801" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32801", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:19:48Z", "details": "critical" } ], "title": "CVE-2021-32801" }, { "cve": "CVE-2021-32802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32802" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32802", "url": "https://www.suse.com/security/cve/CVE-2021-32802" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32802", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:nextcloud-20.0.12-lp152.3.12.1.noarch", "openSUSE Leap 15.2:nextcloud-apache-20.0.12-lp152.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-14T10:19:48Z", "details": "critical" } ], "title": "CVE-2021-32802" } ] }
opensuse-su-2021:1275-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nextcloud", "title": "Title of the patch" }, { "category": "description", "text": "This update for nextcloud fixes the following issues:\n\nUpdate to 20.0.12\n\nFix boo#1190291 \n\n- CVE-2021-32766 (CWE-209): Generation of Error Message Containing Sensitive Information \n- CVE-2021-32800 (CWE-306): Missing Authentication for Critical Function \n- CVE-2021-32801 (CWE-532): Insertion of Sensitive Information into Log File \n- CVE-2021-32802 (CWE-829): Inclusion of Functionality from Untrusted Control Sphere \n\nChanges\n\n- Bump vue-router from 3.4.3 to 3.4.9 (server#27224)\n- Bump v-click-outside from 3.1.1 to 3.1.2 (server#27232)\n- Bump url-search-params-polyfill from 8.1.0 to 8.1.1 (server#27236)\n- Bump debounce from 1.2.0 to 1.2.1 (server#27646)\n- Bump vue and vue-template-compiler (server#27701)\n- Design fixes to app-settings button (server#27745)\n- Reset checksum when writing files to object store (server#27754)\n- Run s3 tests again (server#27804)\n- Fix in locking cache check (server#27829)\n- Bump dompurify from 2.2.8 to 2.2.9 (server#27836)\n- Make search popup usable on mobile, too (server#27858)\n- Cache images on browser (server#27863)\n- Fix dark theme on public link shares (server#27895)\n- Make user status usable on mobile (server#27897)\n- Do not escape display name in dashboard welcome text (server#27913)\n- Bump moment-timezone from 0.5.31 to 0.5.33 (server#27924)\n- Fix newfileMenu on public page (server#27941)\n- Fix svg icons disapearing in app navigation when text overflows (server#27955)\n- Bump bootstrap from 4.5.2 to 4.5.3 (server#27965)\n- Show registered breadcrumb detail views in breadcrumb menu (server#27970)\n- Fix regression in file sidebar (server#27976)\n- Bump exports-loader from 1.1.0 to 1.1.1 (server#27984)\n- Bump @nextcloud/capabilities from 1.0.2 to 1.0.4 (server#27985)\n- Bump @nextcloud/vue-dashboard from 1.0.0 to 1.0.1 (server#27988)\n- Improve notcreatable permissions hint (server#28006)\n- Update CRL due to revoked twofactor_nextcloud_notification.crt (server#28018)\n- Bump sass-loader from 10.0.2 to 10.0.5 (server#28032)\n- Increase footer height for longer menus (server#28045)\n- Mask password for Redis and RedisCluster on connection failure (server#28054)\n- Fix missing theming for login button (server#28065)\n- Fix overlapping of elements in certain views (server#28072)\n- Disable HEIC image preview provider for performance concerns (server#28081)\n- Improve provider check (server#28087)\n- Sanitize more functions from the encryption app (server#28091)\n- Hide download button for public preview of audio files (server#28096)\n- L10n: HTTP in capital letters (server#28107)\n- Fix dark theme in file exists dialog (server#28111)\n- Let memory limit set in tests fit the used amount (server#28125)\n- User management - Add icon to user groups (server#28172)\n- Bump marked from 1.1.1 to 1.1.2 (server#28187)\n- Fix variable override in file view (server#28191)\n- Bump regenerator-runtime from 0.13.7 to 0.13.9 (server#28207)\n- Bump url-loader from 4.1.0 to 4.1.1 (server#28208)\n- Fix Files breadcrumbs being hidden even if there is enough space (server#28224)\n- Dont apply jail search filter is on the root (server#28241)\n- Check that php was compiled with argon2 support or that the php-sodium extensions is installed (server#28289)\n- Fix preference name when generating notifications (activity#603)\n- Fix monochrome icon detection for correct dark mode invert (activity#607)\n- Fix \u0027Enable notification emails\u0027 (activity#613)\n- Show add, del and restored files within by and self filter (activity#616)\n- Link from app-navigation-settings to personal settings (activity#625)\n- Fix pdfviewer design (files_pdfviewer#446)\n- Include version number in firstrunwizard (firstrunwizard#570)\n- Use notification main link if no parameter has a link (notifications#1040)\n- Bump sass-loader from 10.1.0 to 10.1.1 (text#1360)\n- Bump @babel/plugin-transform-runtime from 7.13.9 to 7.13.15 (text#1548)\n- Bump @babel/preset-env from 7.13.9 to 7.13.15 (text#1550)\n- Bump vue-loader from 15.9.6 to 15.9.7 (text#1592)\n- Unify error responses and add logging where appropriate (text#1719)\n- Disable header timeout on mobile (viewer#978)\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-1275", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1275-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:1275-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MPG3PDTQCC4GNWH7SOI44CK2TZJDN5R/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:1275-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MPG3PDTQCC4GNWH7SOI44CK2TZJDN5R/" }, { "category": "self", "summary": "SUSE Bug 1190291", "url": "https://bugzilla.suse.com/1190291" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32766 page", "url": "https://www.suse.com/security/cve/CVE-2021-32766/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32800 page", "url": "https://www.suse.com/security/cve/CVE-2021-32800/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32801 page", "url": "https://www.suse.com/security/cve/CVE-2021-32801/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32802 page", "url": "https://www.suse.com/security/cve/CVE-2021-32802/" } ], "title": "Security update for nextcloud", "tracking": { "current_release_date": "2021-09-16T10:07:16Z", "generator": { "date": "2021-09-16T10:07:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:1275-1", "initial_release_date": "2021-09-16T10:07:16Z", "revision_history": [ { "date": "2021-09-16T10:07:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nextcloud-20.0.12-bp152.2.12.1.noarch", "product": { "name": "nextcloud-20.0.12-bp152.2.12.1.noarch", "product_id": "nextcloud-20.0.12-bp152.2.12.1.noarch" } }, { "category": "product_version", "name": "nextcloud-apache-20.0.12-bp152.2.12.1.noarch", "product": { "name": "nextcloud-apache-20.0.12-bp152.2.12.1.noarch", "product_id": "nextcloud-apache-20.0.12-bp152.2.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP2", "product": { "name": "SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nextcloud-20.0.12-bp152.2.12.1.noarch as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch" }, "product_reference": "nextcloud-20.0.12-bp152.2.12.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "nextcloud-apache-20.0.12-bp152.2.12.1.noarch as component of SUSE Package Hub 15 SP2", "product_id": "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" }, "product_reference": "nextcloud-apache-20.0.12-bp152.2.12.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32766" } ], "notes": [ { "category": "general", "text": "Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with \"Upload Only\" privileges. (aka \"File Drop\"). A link share recipient is not expected to see which folders or files exist in a \"File Drop\" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected \"File Drop\" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32766", "url": "https://www.suse.com/security/cve/CVE-2021-32766" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32766", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-16T10:07:16Z", "details": "critical" } ], "title": "CVE-2021-32766" }, { "cve": "CVE-2021-32800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32800" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32800", "url": "https://www.suse.com/security/cve/CVE-2021-32800" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32800", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-16T10:07:16Z", "details": "critical" } ], "title": "CVE-2021-32800" }, { "cve": "CVE-2021-32801", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32801" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32801", "url": "https://www.suse.com/security/cve/CVE-2021-32801" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32801", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-16T10:07:16Z", "details": "critical" } ], "title": "CVE-2021-32801" }, { "cve": "CVE-2021-32802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32802" } ], "notes": [ { "category": "general", "text": "Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn\u0027t suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32802", "url": "https://www.suse.com/security/cve/CVE-2021-32802" }, { "category": "external", "summary": "SUSE Bug 1190291 for CVE-2021-32802", "url": "https://bugzilla.suse.com/1190291" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP2:nextcloud-20.0.12-bp152.2.12.1.noarch", "SUSE Package Hub 15 SP2:nextcloud-apache-20.0.12-bp152.2.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2021-09-16T10:07:16Z", "details": "critical" } ], "title": "CVE-2021-32802" } ] }
gsd-2021-32800
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-32800", "description": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "id": "GSD-2021-32800", "references": [ "https://www.suse.com/security/cve/CVE-2021-32800.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-32800" ], "details": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.", "id": "GSD-2021-32800", "modified": "2023-12-13T01:23:08.811253Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32800", "STATE": "PUBLIC", "TITLE": "Bypass of Two Factor Authentication in Nextcloud server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "security-advisories", "version": { "version_data": [ { "version_value": "\u003c 20.0.12" }, { "version_value": "\u003e= 21.0.0, \u003c 21.0.4" }, { "version_value": "\u003e= 22.0.0, \u003c 22.1.0" } ] } } ] }, "vendor_name": "nextcloud" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v", "refsource": "CONFIRM", "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "name": "https://github.com/nextcloud/server/pull/28078", "refsource": "MISC", "url": "https://github.com/nextcloud/server/pull/28078" }, { "name": "https://hackerone.com/reports/1271052", "refsource": "MISC", "url": "https://hackerone.com/reports/1271052" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-17" } ] }, "source": { "advisory": "GHSA-gv5w-8q25-785v", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.0.4", "versionStartIncluding": "21.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22.1.0", "versionStartIncluding": "22.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "20.0.12", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32800" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-306" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v" }, { "name": "https://hackerone.com/reports/1271052", "refsource": "MISC", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1271052" }, { "name": "https://github.com/nextcloud/server/pull/28078", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/28078" }, { "name": "GLSA-202208-17", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2 } }, "lastModifiedDate": "2022-09-27T14:18Z", "publishedDate": "2021-09-07T22:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.