5.4
CVE-2022-31014
- EPSS 0.87%
- Published 05.07.2022 18:15:07
- Last modified 21.11.2024 07:03:42
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. It is recommended that the Nextcloud Server is upgraded to 22.2.8 , 23.0.5 or 24.0.1. There are no known workarounds for this issue.
Data is provided by the National Vulnerability Database (NVD)
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version < 19.0.13.7
Nextcloud ≫ Nextcloud Server Version < 22.2.8
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 20.0.0 < 20.0.14.6
Nextcloud ≫ Nextcloud Server SwEditionenterprise Version >= 21.0.0 < 21.0.9.5
Nextcloud ≫ Nextcloud Server Version >= 23.0.0 < 23.0.5
Nextcloud ≫ Nextcloud Server Version24.0.0 Update-
Nextcloud ≫ Nextcloud Server Version24.0.0 Updatebeta1
Nextcloud ≫ Nextcloud Server Version24.0.0 Updatebeta2
Nextcloud ≫ Nextcloud Server Version24.0.0 Updatebeta3
Nextcloud ≫ Nextcloud Server Version24.0.0 Updaterc1
Nextcloud ≫ Nextcloud Server Version24.0.0 Updaterc2
Nextcloud ≫ Nextcloud Server Version24.0.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.87% | 0.744 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 3.5 | 2.1 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
|
nvd@nist.gov | 3.5 | 6.8 | 2.9 |
AV:N/AC:M/Au:S/C:N/I:P/A:N
|
security-advisories@github.com | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection')
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.