CVE-2021-32766

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-32766
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32766.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-32766
Related
Published
2021-09-07T21:15:08Z
Modified
2025-02-19T03:26:38.099828Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.

References

Affected packages

Git / github.com/nextcloud/server

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

20.*

20.0.12rc1

Other

list

v1.*

v1.0.0beta1
v1.0RC1
v1.1

v11.*

v11.0.0
v11.0RC2

v12.*

v12.0.0beta1
v12.0.0beta2
v12.0.0beta3
v12.0.0beta4

v13.*

v13.0.0RC1
v13.0.0beta1
v13.0.0beta2
v13.0.0beta3
v13.0.0beta4

v14.*

v14.0.0RC1
v14.0.0RC2
v14.0.0beta1
v14.0.0beta2
v14.0.0beta3
v14.0.0beta4

v15.*

v15.0.0RC1
v15.0.0beta1
v15.0.0beta2

v16.*

v16.0.0RC1
v16.0.0alpha1
v16.0.0beta1
v16.0.0beta2
v16.0.0beta3

v17.*

v17.0.0beta1
v17.0.0beta2
v17.0.0beta3
v17.0.0beta4

v18.*

v18.0.0RC1
v18.0.0beta1
v18.0.0beta2
v18.0.0beta3
v18.0.0beta4

v19.*

v19.0.0RC1
v19.0.0RC2
v19.0.0beta1
v19.0.0beta2
v19.0.0beta3
v19.0.0beta4
v19.0.0beta5
v19.0.0beta6
v19.0.0beta7

v2.*

v2.0beta3

v20.*

v20.0.0
v20.0.0RC1
v20.0.0RC2
v20.0.0beta1
v20.0.0beta2
v20.0.0beta3
v20.0.0beta4
v20.0.1
v20.0.10
v20.0.10RC1
v20.0.11
v20.0.11rc1
v20.0.1RC1
v20.0.2
v20.0.2RC1
v20.0.2RC2
v20.0.3
v20.0.3RC2
v20.0.4
v20.0.5
v20.0.5RC1
v20.0.5RC2
v20.0.6
v20.0.6RC1
v20.0.7
v20.0.7RC1
v20.0.8
v20.0.8RC1
v20.0.9
v20.0.9RC1

v3.*

v3.0
v3.0RC1
v3.0alpha1

v4.*

v4.0.0
v4.0.0RC
v4.0.0RC2
v4.0.0beta
v4.0.1
v4.0.3
v4.0.4
v4.0.5
v4.0.6
v4.5.0
v4.5.0RC1
v4.5.0RC2
v4.5.0RC3
v4.5.0beta1
v4.5.0beta2
v4.5.0beta3
v4.5.0beta4

v5.*

v5.0.0
v5.0.0RC1
v5.0.0RC2
v5.0.0RC3
v5.0.0alpha1
v5.0.0beta1
v5.0.0beta2

v6.*

v6.0.0RC1
v6.0.0RC2
v6.0.0alpha2
v6.0.0beta2
v6.0.0beta3
v6.0.0beta4
v6.0.0beta5

v7.*

v7.0.0alpha2
v7.0.0beta1

v8.*

v8.0.0
v8.0.0RC1
v8.0.0RC2
v8.0.0alpha1
v8.0.0alpha2
v8.0.0beta1
v8.0.0beta2
v8.1.0alpha1
v8.1.0alpha2
v8.1.0beta1
v8.1.0beta2
v8.1RC2
v8.2RC1
v8.2beta1

v9.*

v9.0.0beta2
v9.0.1beta2
v9.0beta1
v9.1.0beta1
v9.1.0beta2