Headline
CVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available.
Federated share accepting/declining is not logged in audit log
Low
nickvergessen published GHSA-9qvg-7fwg-722x
Aug 4, 2022
Package
Server (Nextcloud)
Affected versions
< 22.2.7, < 23.0.4
Patched versions
22.2.7, 23.0.4, 24.0.0
Description
Impact
The audit log is used to get a full trail of the actions which is now incompletely. With possible important information.
It seems to be also listed on https://portal.nextcloud.com/article/using-the-audit-log-44.html
Patches
It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0
Workarounds
No workaround available
References
- HackerOne
- PullRequest
For more information
If you have any questions or comments about this advisory:
- Create a post in nextcloud/security-advisories
- Customers: Open a support ticket at support.nextcloud.com
Severity
Low
2.1
/ 10
CVSS base metrics
Attack vector
Adjacent
Attack complexity
Low
Privileges required
High
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
CVE ID
CVE-2022-31120
Weaknesses
No CWEs