First published: Fri Nov 25 2022(Updated: )
user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Openid Connect User Backend | <1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39339 is considered a high-severity vulnerability due to the exposure of sensitive information over unencrypted HTTP.
To mitigate CVE-2022-39339, upgrade the OpenID Connect user backend for Nextcloud to version 1.2.1 or later.
CVE-2022-39339 exposes sensitive OIDC client credentials and tokens transmitted in plain text.
Users of the Nextcloud OpenID Connect user backend prior to version 1.2.1 are affected by CVE-2022-39339.
Attackers can intercept and compromise sensitive authentication tokens and credentials by monitoring unencrypted network traffic.