CVE-2021-32688

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-32688
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32688.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-32688
Aliases
  • GHSA-48m7-7r2r-838r
Published
2021-07-12T14:15:08Z
Modified
2024-06-06T13:47:34.683765Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.

References

Affected packages

Git / github.com/nextcloud/server

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/server
Events

Affected versions

v21.*

v21.0.0
v21.0.1
v21.0.1RC1
v21.0.2
v21.0.2RC1
v21.0.3rc1