vulnerability
Arch Linux: Privilege escalation (CVE-2021-32688)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 12, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 12, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-32688
- https://attackerkb.com/topics/CVE-2021-32688
- URL-https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r
- URL-https://github.com/nextcloud/server/pull/27000
- URL-https://hackerone.com/reports/1193321
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BVZS26RDME2DYTKET5AECRIZDFUGR2AZ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J63NBVPR2AQCAWRNDOZSGRY5II4WS2CZ/
- URL-https://security.archlinux.org/ASA-202107-22
- URL-https://security.gentoo.org/glsa/202208-17
- CWE-285
- CWE-552
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.