user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vff-cq8h-chhg | Patch Third Party Advisory |
https://github.com/nextcloud/user_oidc/pull/495 | Patch Third Party Advisory |
https://hackerone.com/reports/1687005 | Permissions Required Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-11-25 19:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-39339
Mitre link : CVE-2022-39339
CVE.ORG link : CVE-2022-39339
JSON object : View
Products Affected
nextcloud
- openid_connect_user_backend
CWE
CWE-319
Cleartext Transmission of Sensitive Information