Multiple vulnerabilities in Nextcloud Server



Published: 2021-09-07
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2021-32801
CVE-2021-32766
CVE-2021-32800
CVE-2021-32802
CWE-ID CWE-532
CWE-200
CWE-287
CWE-829
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Nextcloud Server
Client/Desktop applications / Messaging software

Vendor Nextcloud

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU56362

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-32801

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software stores sensitive information into log files. A remote attacker can read the log files and gain access to sensitive data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Nextcloud Server: 20.0.0 - 21.0.3

External links

http://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU56366

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-32766

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output within the Nextcloud Text application. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Nextcloud Server: 20.0.0 - 21.0.3

External links

http://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper Authentication

EUVDB-ID: #VU56365

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-32800

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote authenticated attacker can bypass Two Factor Authentication and gain access to an account.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Nextcloud Server: 20.0.0 - 21.0.3

External links

http://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Inclusion of Functionality from Untrusted Control Sphere

EUVDB-ID: #VU56363

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-32802

CWE-ID: CWE-829 - Inclusion of Functionality from Untrusted Control Sphere

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to preview generation used third-party library not suited for user-generated content. A remote attacker can execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Nextcloud Server: 20.0.0 - 21.0.3

External links

http://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###