7.5
CVE-2022-36074
- EPSS 0.13%
- Published 15.09.2022 22:15:11
- Last modified 21.11.2024 07:12:19
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
Data is provided by the National Vulnerability Database (NVD)
Nextcloud ≫ Nextcloud Enterprise Server Version < 22.2.11
Nextcloud ≫ Nextcloud Enterprise Server Version >= 23.0.0 < 23.0.7
Nextcloud ≫ Nextcloud Enterprise Server Version >= 24.0.0 < 24.0.3
Nextcloud ≫ Nextcloud Server Version < 23.0.7
Nextcloud ≫ Nextcloud Server Version >= 24.0.0 < 24.0.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.13% | 0.331 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
security-advisories@github.com | 6.4 | 1.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-863 Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.