Lucene search

K
nextcloudNextcloudGHSA-7CWM-QPH5-4H5W
HistoryMay 30, 2022 - 10:58 a.m.

Improper input-size validation on the user new session name

2022-05-3010:58:34
github.com
18
input-size validation
new session
app passwords
memory
performance
nextcloud server
upgrade
patch
hackerone
pullrequest
security advisory
support ticket

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

47.3%

Description

Impact

Missing input-size validation of new session names allows users to create app passwords with long names which are then loaded into memory on usage, resulting in impacted performance.

Patches

It is recommended that the Nextcloud Server is upgraded to 22.2.7 or 23.0.4

Workarounds

No workaround available

References

For more information

If you have any questions or comments about this advisory:

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

47.3%