Bug 2259147 (CVE-2024-22400) - CVE-2024-22400 nextcloud: users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server
Summary: CVE-2024-22400 nextcloud: users can be given a link to the Nextcloud server ...
Keywords:
Status: NEW
Alias: CVE-2024-22400
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2259148 2259149 2259150 2259151 2259152 2259153 2259154
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-01-19 08:28 UTC by Rohit Keshri
Modified: 2024-01-19 08:30 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2024-01-19 08:28:12 UTC
Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue.

https://github.com/nextcloud/security-advisories/security/advisories/GHSA-622q-xhfr-xmv7
https://github.com/nextcloud/user_saml/commit/b184304a476deeba36e92b70562d5de7c2f85f8a
https://github.com/nextcloud/user_saml/pull/788
https://hackerone.com/reports/2263044

Comment 1 Rohit Keshri 2024-01-19 08:30:02 UTC
Created nextcloud tracking bugs for this issue:

Affects: fedora-all [bug 2259149]


Created nextcloud:23/nextcloud tracking bugs for this issue:

Affects: epel-all [bug 2259150]
Affects: fedora-all [bug 2259152]


Created nextcloud:24/nextcloud tracking bugs for this issue:

Affects: epel-all [bug 2259148]
Affects: fedora-all [bug 2259153]


Created nextcloud:nextcloud-22/nextcloud tracking bugs for this issue:

Affects: epel-all [bug 2259151]


Created nextcloud:nextcloud-stable/nextcloud tracking bugs for this issue:

Affects: fedora-all [bug 2259154]


Note You need to log in before you can comment on or make changes to this bug.