First published: Mon Apr 11 2022(Updated: )
Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:<BOOKING USER'S EMAIL> ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud calendar | <3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24838 is a vulnerability in Nextcloud Calendar that allows for SMTP command injection through newlines in appointment emails.
The severity of CVE-2022-24838 is critical with a CVSS score of 9.8.
CVE-2022-24838 affects Nextcloud Calendar version 3.2.2 and lower.
CVE-2022-24838 can be exploited by injecting newlines into the email value of a JSON request, allowing malicious commands to be executed.
Yes, a fix for CVE-2022-24838 has been released. It is recommended to update to a version that includes the fix.