Vulnerability Description
Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nextcloud | Nextcloud Enterprise Server | < 22.2.11 |
| Nextcloud | Nextcloud Server | < 23.0.7 |
Related Weaknesses (CWE)
References
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-fThird Party Advisory
- https://github.com/nextcloud/server/pull/32941PatchThird Party Advisory
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vqgm-fThird Party Advisory
- https://github.com/nextcloud/server/pull/32941PatchThird Party Advisory
FAQ
What is CVE-2022-36074?
CVE-2022-36074 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. Thi...
How severe is CVE-2022-36074?
CVE-2022-36074 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36074?
Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Nextcloud Enterprise Server, Nextcloud Nextcloud Server.