CVE-2021-32734
low-risk
Published 2021-07-12
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, the Nextcloud Text application shipped with Nextcloud Server returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, one may disable the Nextcloud Text application in Nextcloud Server app settings.
Do I need to act?
-
0.33% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c...
Permissions Required
https://hackerone.com/reports/1246721
Third Party Advisory
https://security.gentoo.org/glsa/202208-17
Third Party Advisory
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c...
Permissions Required
https://hackerone.com/reports/1246721
Third Party Advisory
https://security.gentoo.org/glsa/202208-17
17
/ 100
low-risk
Severity
11/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal