CVE-2021-41233

Source
https://cve.org/CVERecord?id=CVE-2021-41233
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41233.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-41233
Related
  • GHSA-26c8-35cm-xq9m
Published
2022-03-10T21:15:13.213Z
Modified
2026-03-13T05:11:59.636281Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.

References

Affected packages

Git / github.com/nextcloud/server

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/server
Events
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "20.0.14"
        },
        {
            "introduced": "21.0.0"
        },
        {
            "fixed": "21.0.6"
        },
        {
            "introduced": "22.2.0"
        },
        {
            "fixed": "22.2.1"
        }
    ]
}

Affected versions

v21.*
v21.0.0
v21.0.1
v21.0.1RC1
v21.0.2
v21.0.2RC1
v21.0.3
v21.0.3rc1
v21.0.4
v21.0.4rc1
v21.0.5
v21.0.5rc1
v21.0.6rc1
v22.*
v22.2.0
v22.2.1rc1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41233.json"