
Cloud Vulnerability DB
A community-led vulnerabilities database
Nextcloud Server, a data storage package, was found to have a vulnerability in versions prior to 19.0.13, 20.011, and 21.0.3 due to a lack of ratelimiting on the public DAV endpoint. The vulnerability was discovered and disclosed in July 2021 (GitHub Advisory).
The vulnerability stems from missing rate limiting controls on the public WebDAV endpoint, which could allow attackers to perform unlimited authentication attempts. This security flaw is tracked as CVE-2021-32705 with a CVSS v3.1 base score of 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The issue is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) and CWE-799 (Improper Control of Interaction Frequency) (NVD).
The vulnerability could allow an attacker to enumerate potentially valid share tokens or credentials through unlimited authentication attempts against the public DAV endpoint (GitHub Advisory).
The vulnerability was patched in Nextcloud Server versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds, and users are strongly recommended to upgrade to the patched versions (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."