
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-41177 is a security vulnerability affecting Nextcloud Server versions prior to 20.0.13, 21.0.5, and 22.2.0. The vulnerability was discovered and disclosed on October 25, 2021, impacting the rate-limiting functionality of Nextcloud installations (Nextcloud Advisory).
The vulnerability stems from Nextcloud Server's failure to implement a database backend for rate-limiting purposes. As a result, any component of Nextcloud using rate-limits (such as AnonRateThrottle or UserRateThrottle) was not properly rate-limited on instances without a configured memory cache backend. This particularly affected the rate-limits on two-factor authentication codes in default installations (Nextcloud Advisory).
The vulnerability could lead to a bypass of security rate-limiting mechanisms, potentially allowing attackers to perform brute-force attacks against two-factor authentication codes and other rate-limited functionalities without proper throttling (Nextcloud Advisory).
The vulnerability has been patched in Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0. As a workaround, administrators can enable a memory cache backend in config.php, as shown in the config.sample.php file (Nextcloud Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."