First published: Thu Oct 27 2022(Updated: )
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a SharePoint service. Nextcloud Server versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server versions 22.2.10.5, 23.0.9, and 24.0.5 contain a patch for this issue. As a workaround, set `zend.exception_ignore_args = On` as an option in `php.ini`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Enterprise Server | <22.2.10.5 | |
Nextcloud Nextcloud Enterprise Server | >=23.0.0<23.0.9 | |
Nextcloud Nextcloud Enterprise Server | >=24.0.0<24.0.5 | |
Nextcloud Nextcloud Server | <23.0.9 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39364 refers to a vulnerability in Nextcloud Server and Nextcloud Enterprise Server that allows an attacker reading nextcloud.log to gain knowledge of credentials.
CVE-2022-39364 has a severity rating of 6.5 (medium).
CVE-2022-39364 affects Nextcloud Server versions up to 23.0.9 and Nextcloud Enterprise Server versions up to 22.2.10.5, 23.0.9, and 24.0.5.
An attacker can exploit CVE-2022-39364 by reading nextcloud.log to gain knowledge of credentials.
Yes, you can find references for CVE-2022-39364 on the Nextcloud Security Advisories page and the Nextcloud Server GitHub repository.