CVE-2022-36074
Summary
| CVE | CVE-2022-36074 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-09-15 22:15:00 UTC |
| Updated | 2023-07-21 21:01:00 UTC |
| Description | Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Bump guzzlehttp/guzzle from 7.4.0 to 7.4.4 by CarlSchwan · Pull Request #32941 · nextcloud/server · GitHub |
MISC |
github.com |
|
| Authentication header is passed on by Nextcloud Server due to a vulnerable GuzzleHTTP version · Advisory · nextcloud/security-advisories · GitHub |
CONFIRM |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 730688 Nextcloud Server Information Exposure Vulnerability