CVE-2022-36074
15.09.2022, 22:15
Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.Enginsight
Vendor | Product | Version |
---|---|---|
nextcloud | nextcloud_enterprise_server | 𝑥 < 22.2.11 |
nextcloud | nextcloud_enterprise_server | 23.0.0 ≤ 𝑥 < 23.0.7 |
nextcloud | nextcloud_enterprise_server | 24.0.0 ≤ 𝑥 < 24.0.3 |
nextcloud | nextcloud_server | 𝑥 < 23.0.7 |
nextcloud | nextcloud_server | 24.0.0 ≤ 𝑥 < 24.0.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.