CVE-2024-22400
low-risk
Published 2024-01-18
Nextcloud User Saml is an app for authenticating Nextcloud users using SAML. In affected versions users can be given a link to the Nextcloud server and end up on a uncontrolled thirdparty server. It is recommended that the User Saml app is upgraded to version 5.1.5, 5.2.5, or 6.0.1. There are no known workarounds for this issue.
Do I need to act?
-
0.27% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
NETWORK
/ HIGH complexity
Affected Products (2)
Sso \& Saml Authentication
Sso \& Saml Authentication
Affected Vendors
References (8)
Permissions Required
https://hackerone.com/reports/2263044
Permissions Required
https://hackerone.com/reports/2263044
19
/ 100
low-risk
Severity
11/34 · Low
Exploitability
1/34 · Minimal
Exposure
7/34 · Low