SB2022031412 - Multiple vulnerabilities in Nextcloud Server
Published: March 14, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2021-41233)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Nextcloud Text application. A remote user can access the folder names of "File Drop".
2) Information disclosure (CVE-ID: CVE-2021-41239)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to User Status API does not consider the user enumeration settings by the administrator. A remote user can gain unauthorized access to sensitive information on the system.
3) Improper Authorization (CVE-ID: CVE-2021-41241)
The vulnerability allows a remote attacker to bypass authorization check.
The vulnerability exists due to insufficient authorization validation in the groupfolders application. A remote user can gain access to the groupfolder but not specific subfolders.
Remediation
Install update from vendor's website.
References
- https://github.com/nextcloud/text/pull/1884
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-26c8-35cm-xq9m
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx
- https://github.com/nextcloud/server/pull/29260
- https://github.com/nextcloud/server/issues/27122
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94
- https://github.com/nextcloud/server/pull/29362
- https://github.com/nextcloud/groupfolders/issues/1692