Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-22400
HistoryJan 18, 2024 - 7:21 p.m.

CVE-2024-22400 Open redirect in user_saml via RelayState parameter in Nextcloud User Saml

2024-01-1819:21:06
CWE-601
GitHub_M
www.cve.org
1
cve-2024-22400
open redirect
nextcloud user saml
saml
upgrade advisory

3.1 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

20.6%

Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue.

CNA Affected

[
  {
    "vendor": "nextcloud",
    "product": "security-advisories",
    "versions": [
      {
        "version": ">= 5.0.0, < 5.1.5",
        "status": "affected"
      },
      {
        "version": ">= 5.2.0, < 5.2.5",
        "status": "affected"
      },
      {
        "version": ">= 6.0.0, < 6.0.1",
        "status": "affected"
      }
    ]
  }
]

3.1 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

20.6%

Related for CVELIST:CVE-2024-22400