Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-41968
HistoryDec 01, 2022 - 8:38 p.m.

CVE-2022-41968 Nextcloud Server's calendar name length not validated before writing to database

2022-12-0120:38:46
CWE-400
GitHub_M
www.cve.org
7
cve-2022-41968
nextcloud server
database validation
version 23.0.10
version 24.0.5
security patch
unnecessary data
attack
personal cloud server

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

43.1%

Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.10 and 24.0.5, calendar name lengths are not validated before writing to a database. As a result, an attacker can send unnecessary amounts of data against the database. Version 23.0.10 and 24.0.5 contain patches for the issue. No known workarounds are available.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": "< 23.0.10",
        "status": "affected"
      },
      {
        "version": ">= 24.0.0, < 24.0.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

43.1%

Related for CVELIST:CVE-2022-41968