CVE-2022-39339

user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:openid_connect_user_backend:*:*:*:*:*:nextcloud:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vff-cq8h-chhg - Patch, Third Party Advisory () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vff-cq8h-chhg - Patch, Third Party Advisory
References () https://github.com/nextcloud/user_oidc/pull/495 - Patch, Third Party Advisory () https://github.com/nextcloud/user_oidc/pull/495 - Patch, Third Party Advisory
References () https://hackerone.com/reports/1687005 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1687005 - Permissions Required, Third Party Advisory

Information

Published : 2022-11-25 19:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-39339

Mitre link : CVE-2022-39339

CVE.ORG link : CVE-2022-39339


JSON object : View

Products Affected

nextcloud

  • openid_connect_user_backend
CWE
CWE-319

Cleartext Transmission of Sensitive Information