CVE-2024-22400
Published Jan 18, 2024
Last updated 10 months ago
Overview
- Description
- Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security-advisories@github.com
- CWE-601
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:sso_\\&_saml_authentication:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68724AAA-D837-4365-88F2-835D518A1805", "versionEndExcluding": "5.1.5", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:nextcloud:sso_\\&_saml_authentication:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F52CDDE-DE98-4150-B3A1-1FB15C6A0F19", "versionEndExcluding": "5.2.5", "versionStartIncluding": "5.2.0" }, { "criteria": "cpe:2.3:a:nextcloud:sso_\\&_saml_authentication:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85B7A2B1-195F-4C8C-8521-E6C140A79B7A" } ], "operator": "OR" } ] } ]