CVE-2022-39364
low-risk
Published 2022-10-27
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a SharePoint service. Nextcloud Server versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server versions 22.2.10.5, 23.0.9, and 24.0.5 contain a patch for this issue. As a workaround, set `zend.exception_ignore_args = On` as an option in `php.ini`.
Do I need to act?
-
0.23% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.0/10
Medium
LOCAL
/ HIGH complexity
Affected Products (2)
Nextcloud Enterprise Server
Affected Vendors
References (8)
Third Party Advisory
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-j...
Permissions Required
https://hackerone.com/reports/1652903
Third Party Advisory
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-j...
Permissions Required
https://hackerone.com/reports/1652903
18
/ 100
low-risk
Severity
10/34 · Low
Exploitability
1/34 · Minimal
Exposure
7/34 · Low