Skip to content

Authentication header is passed on by Nextcloud Server due to a vulnerable GuzzleHTTP version

Low
nickvergessen published GHSA-vqgm-f748-g76v Sep 15, 2022

Package

Server (Nextcloud)

Affected versions

< 23.0.7, < 24.0.3

Patched versions

23.0.7, 24.0.3
Server (Nextcloud Enterprise)
< 22.2.11, < 23.0.7, < 24.0.3
22.2.11, 23.0.7, 24.0.3

Description

Impact

Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade, this depency is out of date and it can leat to still authorization header.

Patches

It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3.
It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3.

Workarounds

No workaround available

References

For more information

If you have any questions or comments about this advisory:

Severity

Low
3.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N

CVE ID

CVE-2022-36074

Weaknesses

Credits