Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v | third party advisory |
https://github.com/nextcloud/server/pull/28078 | third party advisory patch |
https://hackerone.com/reports/1271052 | third party advisory permissions required |
https://security.gentoo.org/glsa/202208-17 | third party advisory vendor advisory |