Lucene search

K
nvd[email protected]NVD:CVE-2024-22400
HistoryJan 18, 2024 - 8:15 p.m.

CVE-2024-22400

2024-01-1820:15:08
CWE-601
web.nvd.nist.gov
nextcloud
user saml
authentication
vulnerability
uncontrolled thirdparty server

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue.

Affected configurations

NVD
Node
nextcloudsso_\&_saml_authenticationRange5.0.05.1.5
OR
nextcloudsso_\&_saml_authenticationRange5.2.05.2.5
OR
nextcloudsso_\&_saml_authenticationMatch6.0.0

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

Related for NVD:CVE-2024-22400