Search criteria

10 vulnerabilities found for Server by Nextcloud

CERTFR-2025-AVI-1066

Vulnerability from certfr_avis - Published: 2025-12-05 - Updated: 2025-12-05

De multiples vulnérabilités ont été découvertes dans les produits Nextcloud. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Nextcloud Server Server versions 28.0.x antérieures à 28.0.14.11
Nextcloud Groupfolders Groupfolders versions 15.3.x antérieures à 15.3.12
Nextcloud Server Server versions 30.0.x antérieures à 30.0.17.3
Nextcloud Server Server versions 31.0.x antérieures à 31.0.12
Nextcloud Calendar Calendar versions 5.x antérieures à 5.5.6
Nextcloud Deck Deck versions 1.14.x antérieures à 1.14.4
Nextcloud Groupfolders Groupfolders versions 19.1.x antérieures à 19.1.8
Nextcloud Server Server versions 29.0.x antérieures à 29.0.16.8
Nextcloud Groupfolders Groupfolders versions 16.0.x antérieures à 16.0.15
Nextcloud Calendar Calendar versions 4.x antérieures à 4.7.19
Nextcloud Approval Approval versions 2.x antérieures à 2.5.0
Nextcloud Groupfolders Groupfolders versions 18.1.x antérieures à 18.1.8
Nextcloud Deck Deck versions 1.15.x antérieures à 1.15.1
Nextcloud Tables Tables versions antérieures à 1.0.1
Nextcloud Server Server versions 32.0.x antérieures à 32.0.3
Nextcloud Approval Approval versions 1.x antérieures à 1.3.1
Nextcloud Calendar Calendar versions 6.0.x antérieures à 6.0.3
Nextcloud Deck Deck versions 1.12.x antérieures à 1.12.7
Nextcloud Groupfolders Groupfolders versions 17.0.x antérieures à 17.0.14
Nextcloud Mail Mail versions antérieures à 5.5.3
Nextcloud Groupfolders Groupfolders versions 14.0.x antérieures à 14.0.11
Nextcloud Groupfolders Groupfolders versions 20.1.x antérieures à 20.1.2

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Server versions 28.0.x ant\u00e9rieures \u00e0 28.0.14.11",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 15.3.x ant\u00e9rieures \u00e0 15.3.12",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 30.0.x ant\u00e9rieures \u00e0 30.0.17.3",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 31.0.x ant\u00e9rieures \u00e0 31.0.12",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Calendar versions 5.x ant\u00e9rieures \u00e0 5.5.6",
      "product": {
        "name": "Calendar",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Deck versions 1.14.x ant\u00e9rieures \u00e0 1.14.4",
      "product": {
        "name": "Deck",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 19.1.x ant\u00e9rieures \u00e0 19.1.8",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 29.0.x ant\u00e9rieures \u00e0 29.0.16.8",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 16.0.x ant\u00e9rieures \u00e0 16.0.15",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Calendar versions 4.x ant\u00e9rieures \u00e0 4.7.19",
      "product": {
        "name": "Calendar",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Approval versions 2.x ant\u00e9rieures \u00e0 2.5.0",
      "product": {
        "name": "Approval",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 18.1.x ant\u00e9rieures \u00e0 18.1.8",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Deck versions 1.15.x ant\u00e9rieures \u00e0 1.15.1",
      "product": {
        "name": "Deck",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Tables versions ant\u00e9rieures \u00e0 1.0.1",
      "product": {
        "name": "Tables",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 32.0.x ant\u00e9rieures \u00e0 32.0.3",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Approval versions 1.x ant\u00e9rieures \u00e0 1.3.1",
      "product": {
        "name": "Approval",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Calendar versions 6.0.x ant\u00e9rieures \u00e0 6.0.3",
      "product": {
        "name": "Calendar",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Deck versions 1.12.x ant\u00e9rieures \u00e0 1.12.7",
      "product": {
        "name": "Deck",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 17.0.x ant\u00e9rieures \u00e0 17.0.14",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Mail versions ant\u00e9rieures \u00e0 5.5.3",
      "product": {
        "name": "Mail",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 14.0.x ant\u00e9rieures \u00e0 14.0.11",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 20.1.x ant\u00e9rieures \u00e0 20.1.2",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-66511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66511"
    },
    {
      "name": "CVE-2025-66513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66513"
    },
    {
      "name": "CVE-2025-66515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66515"
    },
    {
      "name": "CVE-2025-66546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66546"
    },
    {
      "name": "CVE-2025-66512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66512"
    },
    {
      "name": "CVE-2025-66514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66514"
    },
    {
      "name": "CVE-2025-66545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66545"
    },
    {
      "name": "CVE-2025-66510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66510"
    },
    {
      "name": "CVE-2025-66547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66547"
    },
    {
      "name": "CVE-2025-66548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66548"
    }
  ],
  "initial_release_date": "2025-12-05T00:00:00",
  "last_revision_date": "2025-12-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-1066",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-12-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Nextcloud. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Nextcloud",
  "vendor_advisories": [
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-q26g-fmjq-x5g5",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q26g-fmjq-x5g5"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-495w-cqv6-wr59",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-495w-cqv6-wr59"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-hq6c-r898-fgf2",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hq6c-r898-fgf2"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-2vrq-fhmf-c49m",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vrq-fhmf-c49m"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-2cwj-qp49-4xfw",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2cwj-qp49-4xfw"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-qcw2-p26m-9gc5",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qcw2-p26m-9gc5"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-7x2j-2674-fj95",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7x2j-2674-fj95"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-v394-8gpc-6fv5",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v394-8gpc-6fv5"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-whm3-vv55-gf27",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-whm3-vv55-gf27"
    },
    {
      "published_at": "2025-12-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-xjvq-xvr7-xpg6",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xjvq-xvr7-xpg6"
    }
  ]
}

CERTFR-2025-AVI-0420

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Nextcloud. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Nextcloud Groupfolders Groupfolders versions 18.0.x antérieures à 18.0.3
Nextcloud Groupfolders Groupfolders versions 17.0.x antérieures à 17.0.5
Nextcloud Enterprise Server Enterprise Server versions 28.0.x antérieures à 28.0.14.6
Nextcloud Enterprise Server Enterprise Server versions 26.0.x antérieures à 26.0.13.15
Nextcloud Desktop Desktop versions antérieures à 3.15
Nextcloud Server Server versions 31.0.x antérieures à 31.0.3
Nextcloud Enterprise Server Enterprise Server versions 27.0.x antérieures à 27.1.11.15
Nextcloud Enterprise Server Enterprise Server versions 29.0.x antérieures à 29.0.15
Nextcloud Enterprise Server Enterprise Server versions 31.0.x antérieures à 31.0.3
Nextcloud Server Server versions 29.0.x antérieures à 29.0.15
Nextcloud Enterprise Server Enterprise Server versions 30.0.x antérieures à 30.0.9
Nextcloud Groupfolders Groupfolders versions 16.0.x antérieures à 16.0.11
Nextcloud Server Server versions 28.0.x antérieures à 28.0.13
Nextcloud Server Server versions 30.0.x antérieures à 30.0.9
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Groupfolders versions 18.0.x ant\u00e9rieures \u00e0 18.0.3",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 17.0.x ant\u00e9rieures \u00e0 17.0.5",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Server versions 28.0.x ant\u00e9rieures \u00e0 28.0.14.6",
      "product": {
        "name": "Enterprise Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Server versions 26.0.x ant\u00e9rieures \u00e0 26.0.13.15",
      "product": {
        "name": "Enterprise Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Desktop versions ant\u00e9rieures \u00e0 3.15",
      "product": {
        "name": "Desktop",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 31.0.x ant\u00e9rieures \u00e0 31.0.3",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Server versions 27.0.x ant\u00e9rieures \u00e0 27.1.11.15",
      "product": {
        "name": "Enterprise Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Server versions 29.0.x ant\u00e9rieures \u00e0 29.0.15",
      "product": {
        "name": "Enterprise Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Server versions 31.0.x ant\u00e9rieures \u00e0 31.0.3",
      "product": {
        "name": "Enterprise Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 29.0.x ant\u00e9rieures \u00e0 29.0.15",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Enterprise Server versions 30.0.x ant\u00e9rieures \u00e0 30.0.9",
      "product": {
        "name": "Enterprise Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Groupfolders versions 16.0.x ant\u00e9rieures \u00e0 16.0.11",
      "product": {
        "name": "Groupfolders",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 28.0.x ant\u00e9rieures \u00e0 28.0.13",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    },
    {
      "description": "Server versions 30.0.x ant\u00e9rieures \u00e0 30.0.9",
      "product": {
        "name": "Server",
        "vendor": {
          "name": "Nextcloud",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-47790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47790"
    },
    {
      "name": "CVE-2025-47791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47791"
    },
    {
      "name": "CVE-2025-47792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47792"
    },
    {
      "name": "CVE-2025-47793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47793"
    },
    {
      "name": "CVE-2025-47794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47794"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0420",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Nextcloud. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Nextcloud",
  "vendor_advisories": [
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-qqgg-hhfq-vhww",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qqgg-hhfq-vhww"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-q568-2933-gcjq",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q568-2933-gcjq"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-c7vq-m7f8-rx37",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c7vq-m7f8-rx37"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-9h3w-f3h4-qqrh",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9h3w-f3h4-qqrh"
    },
    {
      "published_at": "2025-05-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Nextcloud GHSA-qm2f-959g-7p65",
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qm2f-959g-7p65"
    }
  ]
}

FKIE_CVE-2021-41178

Vulnerability from fkie_nvd - Published: 2021-10-25 22:15 - Updated: 2024-11-21 06:25
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
Impacted products
Vendor Product Version
nextcloud server *
nextcloud server *
nextcloud server *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF59A46-813A-4F63-A748-B4B1787475A6",
              "versionEndExcluding": "20.0.13",
              "versionStartIncluding": "20.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8DBD42A-4D0B-4E74-9658-29325664880A",
              "versionEndExcluding": "21.0.5",
              "versionStartIncluding": "21.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD6E21-6B12-460A-AA56-85C83D641E4E",
              "versionEndExcluding": "22.2.0",
              "versionStartIncluding": "22.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
    },
    {
      "lang": "es",
      "value": "Nextcloud es una plataforma de productividad de c\u00f3digo abierto y auto-alojada. Antes de las versiones 20.0.13, 21.0.5 y 22.2.0, una vulnerabilidad de salto de archivos hace que un atacante pueda descargar im\u00e1genes SVG arbitrarias del sistema anfitri\u00f3n, incluyendo archivos proporcionados por el usuario. Esto tambi\u00e9n podr\u00eda ser aprovechado en un ataque de tipo XSS/phishing, un atacante podr\u00eda subir un archivo SVG malicioso que imita el formulario de inicio de sesi\u00f3n de Nextcloud y enviar un enlace especialmente dise\u00f1ado a las v\u00edctimas. El riesgo de un ataque de tipo XSS en este caso est\u00e1 mitigado debido a que Nextcloud emplea una estricta Pol\u00edtica de Seguridad de Contenidos que no permite la ejecuci\u00f3n de JavaScript arbitrario. Es recomendado actualizar el servidor Nextcloud a la versi\u00f3n 20.0.13, 21.0.5 o 22.2.0. No se presentan soluciones conocidas aparte de la actualizaci\u00f3n"
    }
  ],
  "id": "CVE-2021-41178",
  "lastModified": "2024-11-21T06:25:41.047",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-25T22:15:07.913",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/server/pull/28726"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://hackerone.com/reports/1302155"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202208-17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/server/pull/28726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://hackerone.com/reports/1302155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202208-17"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-23"
        },
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2021-41179

Vulnerability from fkie_nvd - Published: 2021-10-25 22:15 - Updated: 2024-11-21 06:25
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
Impacted products
Vendor Product Version
nextcloud server *
nextcloud server *
nextcloud server *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF59A46-813A-4F63-A748-B4B1787475A6",
              "versionEndExcluding": "20.0.13",
              "versionStartIncluding": "20.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8DBD42A-4D0B-4E74-9658-29325664880A",
              "versionEndExcluding": "21.0.5",
              "versionStartIncluding": "21.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nextcloud:server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD6E21-6B12-460A-AA56-85C83D641E4E",
              "versionEndExcluding": "22.2.0",
              "versionStartIncluding": "22.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
    },
    {
      "lang": "es",
      "value": "Nextcloud es una plataforma de productividad de c\u00f3digo abierto y auto-alojada. Nextcloud Server versiones 20.0.13, 21.0.5 y 22.2.0, la autenticaci\u00f3n de dos factores no se aplicaba a las p\u00e1ginas marcadas como p\u00fablicas. Por lo tanto, se pod\u00eda acceder a cualquier p\u00e1gina marcada como \"@PublicPage\" con una sesi\u00f3n de usuario v\u00e1lida que no estuviera autenticada. Esto afecta especialmente a la aplicaci\u00f3n Nextcloud Talk, ya que podr\u00eda aprovecharse para acceder a cualquier canal de chat privado sin pasar por el flujo de dos factores. Es recomendado actualizar el servidor Nextcloud a la versi\u00f3n 20.0.13, 21.0.5 o 22.2.0. No se presentan soluciones conocidas aparte de la actualizaci\u00f3n"
    }
  ],
  "id": "CVE-2021-41179",
  "lastModified": "2024-11-21T06:25:41.217",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2021-10-25T22:15:07.990",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/server/pull/28725"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://hackerone.com/reports/1322865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/nextcloud/server/pull/28725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "https://hackerone.com/reports/1322865"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-304"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}

CVE-2021-41179 (GCVE-0-2021-41179)

Vulnerability from cvelistv5 – Published: 2021-10-25 22:00 – Updated: 2024-08-04 02:59
VLAI?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
CWE
  • CWE-304 - Missing Critical Step in Authentication
Assigner
Impacted products
Vendor Product Version
nextcloud security-advisories Affected: < 20.0.13
Affected: >= 21.0.0, < 21.0.5
Affected: < 22.2.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:59:31.640Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/server/pull/28725"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://hackerone.com/reports/1322865"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "security-advisories",
          "vendor": "nextcloud",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 20.0.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0.0, \u003c 21.0.5"
            },
            {
              "status": "affected",
              "version": "\u003c 22.2.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-304",
              "description": "CWE-304: Missing Critical Step in Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-25T22:00:13",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/nextcloud/server/pull/28725"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://hackerone.com/reports/1322865"
        }
      ],
      "source": {
        "advisory": "GHSA-7hvh-rc6f-px23",
        "discovery": "UNKNOWN"
      },
      "title": "Two-Factor Authentication not enforced for pages marked as public",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-41179",
          "STATE": "PUBLIC",
          "TITLE": "Two-Factor Authentication not enforced for pages marked as public"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "security-advisories",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 20.0.13"
                          },
                          {
                            "version_value": "\u003e= 21.0.0, \u003c 21.0.5"
                          },
                          {
                            "version_value": "\u003c 22.2.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "nextcloud"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-304: Missing Critical Step in Authentication"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23",
              "refsource": "CONFIRM",
              "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
            },
            {
              "name": "https://github.com/nextcloud/server/pull/28725",
              "refsource": "MISC",
              "url": "https://github.com/nextcloud/server/pull/28725"
            },
            {
              "name": "https://hackerone.com/reports/1322865",
              "refsource": "MISC",
              "url": "https://hackerone.com/reports/1322865"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-7hvh-rc6f-px23",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-41179",
    "datePublished": "2021-10-25T22:00:13",
    "dateReserved": "2021-09-15T00:00:00",
    "dateUpdated": "2024-08-04T02:59:31.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-41178 (GCVE-0-2021-41178)

Vulnerability from cvelistv5 – Published: 2021-10-25 21:55 – Updated: 2024-08-04 02:59
VLAI?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
CWE
  • CWE-23 - Relative Path Traversal
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
Impacted products
Vendor Product Version
nextcloud security-advisories Affected: 20.0.13
Affected: >= 21.0.0, < 21.0.5
Affected: < 22.2.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:59:31.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/server/pull/28726"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://hackerone.com/reports/1302155"
          },
          {
            "name": "GLSA-202208-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202208-17"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "security-advisories",
          "vendor": "nextcloud",
          "versions": [
            {
              "status": "affected",
              "version": "20.0.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0.0, \u003c 21.0.5"
            },
            {
              "status": "affected",
              "version": "\u003c 22.2.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23: Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T00:09:51",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/nextcloud/server/pull/28726"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://hackerone.com/reports/1302155"
        },
        {
          "name": "GLSA-202208-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202208-17"
        }
      ],
      "source": {
        "advisory": "GHSA-jp9c-vpr3-m5rf",
        "discovery": "UNKNOWN"
      },
      "title": "File Traversal affecting SVG files on Nextcloud Server",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-41178",
          "STATE": "PUBLIC",
          "TITLE": "File Traversal affecting SVG files on Nextcloud Server"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "security-advisories",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "20.0.13"
                          },
                          {
                            "version_value": "\u003e= 21.0.0, \u003c 21.0.5"
                          },
                          {
                            "version_value": "\u003c 22.2.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "nextcloud"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-23: Relative Path Traversal"
                }
              ]
            },
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf",
              "refsource": "CONFIRM",
              "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
            },
            {
              "name": "https://github.com/nextcloud/server/pull/28726",
              "refsource": "MISC",
              "url": "https://github.com/nextcloud/server/pull/28726"
            },
            {
              "name": "https://hackerone.com/reports/1302155",
              "refsource": "MISC",
              "url": "https://hackerone.com/reports/1302155"
            },
            {
              "name": "GLSA-202208-17",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202208-17"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-jp9c-vpr3-m5rf",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-41178",
    "datePublished": "2021-10-25T21:55:11",
    "dateReserved": "2021-09-15T00:00:00",
    "dateUpdated": "2024-08-04T02:59:31.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-41179 (GCVE-0-2021-41179)

Vulnerability from nvd – Published: 2021-10-25 22:00 – Updated: 2024-08-04 02:59
VLAI?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
CWE
  • CWE-304 - Missing Critical Step in Authentication
Assigner
Impacted products
Vendor Product Version
nextcloud security-advisories Affected: < 20.0.13
Affected: >= 21.0.0, < 21.0.5
Affected: < 22.2.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:59:31.640Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/server/pull/28725"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://hackerone.com/reports/1322865"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "security-advisories",
          "vendor": "nextcloud",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 20.0.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0.0, \u003c 21.0.5"
            },
            {
              "status": "affected",
              "version": "\u003c 22.2.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-304",
              "description": "CWE-304: Missing Critical Step in Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-25T22:00:13",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/nextcloud/server/pull/28725"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://hackerone.com/reports/1322865"
        }
      ],
      "source": {
        "advisory": "GHSA-7hvh-rc6f-px23",
        "discovery": "UNKNOWN"
      },
      "title": "Two-Factor Authentication not enforced for pages marked as public",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-41179",
          "STATE": "PUBLIC",
          "TITLE": "Two-Factor Authentication not enforced for pages marked as public"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "security-advisories",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 20.0.13"
                          },
                          {
                            "version_value": "\u003e= 21.0.0, \u003c 21.0.5"
                          },
                          {
                            "version_value": "\u003c 22.2.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "nextcloud"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn\u0027t enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn\u0027t authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-304: Missing Critical Step in Authentication"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23",
              "refsource": "CONFIRM",
              "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7hvh-rc6f-px23"
            },
            {
              "name": "https://github.com/nextcloud/server/pull/28725",
              "refsource": "MISC",
              "url": "https://github.com/nextcloud/server/pull/28725"
            },
            {
              "name": "https://hackerone.com/reports/1322865",
              "refsource": "MISC",
              "url": "https://hackerone.com/reports/1322865"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-7hvh-rc6f-px23",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-41179",
    "datePublished": "2021-10-25T22:00:13",
    "dateReserved": "2021-09-15T00:00:00",
    "dateUpdated": "2024-08-04T02:59:31.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-41178 (GCVE-0-2021-41178)

Vulnerability from nvd – Published: 2021-10-25 21:55 – Updated: 2024-08-04 02:59
VLAI?
Summary
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.
CWE
  • CWE-23 - Relative Path Traversal
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
Impacted products
Vendor Product Version
nextcloud security-advisories Affected: 20.0.13
Affected: >= 21.0.0, < 21.0.5
Affected: < 22.2.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:59:31.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/nextcloud/server/pull/28726"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://hackerone.com/reports/1302155"
          },
          {
            "name": "GLSA-202208-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202208-17"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "security-advisories",
          "vendor": "nextcloud",
          "versions": [
            {
              "status": "affected",
              "version": "20.0.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 21.0.0, \u003c 21.0.5"
            },
            {
              "status": "affected",
              "version": "\u003c 22.2.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23: Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-11T00:09:51",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/nextcloud/server/pull/28726"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://hackerone.com/reports/1302155"
        },
        {
          "name": "GLSA-202208-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202208-17"
        }
      ],
      "source": {
        "advisory": "GHSA-jp9c-vpr3-m5rf",
        "discovery": "UNKNOWN"
      },
      "title": "File Traversal affecting SVG files on Nextcloud Server",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-41178",
          "STATE": "PUBLIC",
          "TITLE": "File Traversal affecting SVG files on Nextcloud Server"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "security-advisories",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "20.0.13"
                          },
                          {
                            "version_value": "\u003e= 21.0.0, \u003c 21.0.5"
                          },
                          {
                            "version_value": "\u003c 22.2.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "nextcloud"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-23: Relative Path Traversal"
                }
              ]
            },
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf",
              "refsource": "CONFIRM",
              "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf"
            },
            {
              "name": "https://github.com/nextcloud/server/pull/28726",
              "refsource": "MISC",
              "url": "https://github.com/nextcloud/server/pull/28726"
            },
            {
              "name": "https://hackerone.com/reports/1302155",
              "refsource": "MISC",
              "url": "https://hackerone.com/reports/1302155"
            },
            {
              "name": "GLSA-202208-17",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202208-17"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-jp9c-vpr3-m5rf",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-41178",
    "datePublished": "2021-10-25T21:55:11",
    "dateReserved": "2021-09-15T00:00:00",
    "dateUpdated": "2024-08-04T02:59:31.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}