Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 820368 (CVE-2021-41177, CVE-2021-41178) - <www-apps/nextcloud-{20.0.13,21.0.5,22.2.0}: multiple vulnerabilities (CVE-2021-{41177,41178})
Summary: <www-apps/nextcloud-{20.0.13,21.0.5,22.2.0}: multiple vulnerabilities (CVE-20...
Status: RESOLVED FIXED
Alias: CVE-2021-41177, CVE-2021-41178
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL:
Whiteboard: B4 [glsa+]
Keywords:
Depends on: 820602
Blocks:
  Show dependency tree
 
Reported: 2021-10-26 15:17 UTC by John Helmert III
Modified: 2022-08-10 22:35 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-26 15:17:25 UTC
CVE-2021-41177 (https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2):

Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`.

CVE-2021-41178 (https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jp9c-vpr3-m5rf):

Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.

Please stabilize 21.0.5.
Comment 1 Bernard Cafarelli gentoo-dev 2021-10-27 06:20:35 UTC
Ack I will drop vulnerable 20.x and 22.x, and good for stabling 21.0.5
Comment 2 Larry the Git Cow gentoo-dev 2021-10-27 06:21:35 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2b10e3ad11ffd645eed67c766c662c4d4b21d5f8

commit 2b10e3ad11ffd645eed67c766c662c4d4b21d5f8
Author:     Bernard Cafarelli <voyageur@gentoo.org>
AuthorDate: 2021-10-27 06:21:19 +0000
Commit:     Bernard Cafarelli <voyageur@gentoo.org>
CommitDate: 2021-10-27 06:21:31 +0000

    www-apps/nextcloud: drop some security vulnerable versions
    
    Bug: https://bugs.gentoo.org/820368
    Package-Manager: Portage-3.0.28, Repoman-3.0.3
    Signed-off-by: Bernard Cafarelli <voyageur@gentoo.org>

 www-apps/nextcloud/Manifest                 |  2 --
 www-apps/nextcloud/nextcloud-20.0.12.ebuild | 43 -----------------------------
 www-apps/nextcloud/nextcloud-22.1.1.ebuild  | 43 -----------------------------
 3 files changed, 88 deletions(-)
Comment 3 Larry the Git Cow gentoo-dev 2021-10-29 07:13:55 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=267ccf7092a3957f80a8f5004a1ea140124e5c94

commit 267ccf7092a3957f80a8f5004a1ea140124e5c94
Author:     Bernard Cafarelli <voyageur@gentoo.org>
AuthorDate: 2021-10-29 07:13:38 +0000
Commit:     Bernard Cafarelli <voyageur@gentoo.org>
CommitDate: 2021-10-29 07:13:38 +0000

    www-apps/nextcloud: drop security vulnerable version
    
    Bug: https://bugs.gentoo.org/820368
    Package-Manager: Portage-3.0.28, Repoman-3.0.3
    Signed-off-by: Bernard Cafarelli <voyageur@gentoo.org>

 www-apps/nextcloud/Manifest                |  1 -
 www-apps/nextcloud/nextcloud-21.0.4.ebuild | 43 ------------------------------
 2 files changed, 44 deletions(-)
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-29 12:48:08 UTC
Thanks!
Comment 5 Larry the Git Cow gentoo-dev 2022-08-10 22:33:37 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=b56f993e2e4fa0778f67ba7d3b8fbb350d4c7386

commit b56f993e2e4fa0778f67ba7d3b8fbb350d4c7386
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-08-10 22:31:11 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-08-10 22:33:19 +0000

    [ GLSA 202208-17 ] Nextcloud: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/797253
    Bug: https://bugs.gentoo.org/802096
    Bug: https://bugs.gentoo.org/812443
    Bug: https://bugs.gentoo.org/820368
    Bug: https://bugs.gentoo.org/834803
    Bug: https://bugs.gentoo.org/835073
    Bug: https://bugs.gentoo.org/848873
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 glsa-202208-17.xml | 72 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 72 insertions(+)
Comment 6 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-10 22:35:46 UTC
GLSA released, all done!