Vulnerability Description
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nextcloud | Nextcloud Server | < 22.2.7 |
Related Weaknesses (CWE)
References
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qThird Party Advisory
- https://github.com/nextcloud/server/pull/31658PatchThird Party Advisory
- https://hackerone.com/reports/1153138Third Party Advisory
- https://security.gentoo.org/glsa/202208-17Third Party Advisory
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qThird Party Advisory
- https://github.com/nextcloud/server/pull/31658PatchThird Party Advisory
- https://hackerone.com/reports/1153138Third Party Advisory
- https://security.gentoo.org/glsa/202208-17Third Party Advisory
FAQ
What is CVE-2022-29243?
CVE-2022-29243 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to...
How severe is CVE-2022-29243?
CVE-2022-29243 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29243?
Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Nextcloud Server.