First published: Tue May 31 2022(Updated: )
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | <22.2.7 | |
Nextcloud Nextcloud Server | >23.0.0<23.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29243 is a vulnerability in Nextcloud Server that allows users to create app passwords with long names, which can result in excessive memory usage.
The severity of CVE-2022-29243 is medium, with a CVSS score of 4.3.
CVE-2022-29243 affects Nextcloud Server versions up to 22.2.7 and versions up to 23.0.4.
Yes, the fix for CVE-2022-29243 is included in Nextcloud Server versions 22.2.7 and 23.0.4.
You can find more information about CVE-2022-29243 on the Nextcloud security advisories page, the Nextcloud Server pull request, and the HackerOne report.