vulnerability
Arch Linux: Insufficient validation (CVE-2021-32678)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Jul 12, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 12, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
In Nextcloud Server versions prior to 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-32678
- https://attackerkb.com/topics/CVE-2021-32678
- URL-https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j
- URL-https://github.com/nextcloud/server/pull/27329
- URL-https://hackerone.com/reports/1214158
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/
- URL-https://security.archlinux.org/ASA-202107-22
- URL-https://security.gentoo.org/glsa/202208-17
- CWE-799
- CWE-307
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.