// For flags

CVE-2021-37631

Circle can be accessed by non-Circle members in Nextcloud Deck

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin.

Deck es una herramienta de organización estilo kanban de código abierto destinada a la planificación personal y la organización de proyectos para equipos integrada con Nextcloud. En las versiones afectadas, la aplicación Deck no comprobaba apropiadamente la pertenencia de los usuarios a un Circle. Esto permitía a otros usuarios de la instancia conseguir acceso a los tableros que se habían compartido con un Circle, incluso si el usuario no era miembro del mismo. Se recomienda actualizar Nextcloud Deck a versión 1.5.1, 1.4.4 o 1.2.9. Si no se puede actualizar es aconsejable deshabilitar el plugin Deck

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-07-29 CVE Reserved
  • 2021-09-07 CVE Published
  • 2023-03-31 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nextcloud
Search vendor "Nextcloud"
Deck
Search vendor "Nextcloud" for product "Deck"
< 1.2.9
Search vendor "Nextcloud" for product "Deck" and version " < 1.2.9"
-
Affected
Nextcloud
Search vendor "Nextcloud"
Deck
Search vendor "Nextcloud" for product "Deck"
>= 1.3.0 < 1.4.4
Search vendor "Nextcloud" for product "Deck" and version " >= 1.3.0 < 1.4.4"
-
Affected
Nextcloud
Search vendor "Nextcloud"
Deck
Search vendor "Nextcloud" for product "Deck"
>= 1.5.0 < 1.5.1
Search vendor "Nextcloud" for product "Deck" and version " >= 1.5.0 < 1.5.1"
-
Affected