Skip to content

Server-Side Request Forgery (SSRF) via potential filter bypass with too lax local domain checking

Low
nickvergessen published GHSA-rmf9-w497-8cq8 Sep 16, 2022

Package

Server (Nextcloud)

Affected versions

< 23.0.8, < 24.0.4

Patched versions

23.0.8, 24.0.4
Server (Nextcloud Enterprise)
< 22.2.10.4, < 23.0.8, < 24.0.4
22.2.10.4, 23.0.8, 24.0.4

Description

Impact

Locally running webservices can be found and requested

Patches

It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4.
It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4.

Workarounds

No workaround available

References

For more information

If you have any questions or comments about this advisory:

Severity

Low
3.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N

CVE ID

CVE-2022-39211

Weaknesses

Credits