First published: Thu Dec 01 2022(Updated: )
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.11, 24.0.7, and 25.0.0, there is no password length limit when creating a user as an administrator. An administrator can cause a limited DoS attack against their own server. Versions 23.0.11, 24.0.7, and 25.0.0 contain a fix for the issue. As a workaround, don't create user accounts with long passwords.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Nextcloud Server | >=23.0.0<23.0.11 | |
Nextcloud Nextcloud Server | >=23.0.0<23.0.11 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.7 | |
Nextcloud Nextcloud Server | >=24.0.0<24.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41969 is a vulnerability in Nextcloud Server that allows an administrator to cause a limited Denial of Service (DoS) attack against their own server by creating a user with no password length limit.
An attacker can exploit CVE-2022-41969 by creating a user with a very long password, which can lead to a limited DoS attack against the Nextcloud Server.
CVE-2022-41969 has a severity rating of low with a score of 2.7.
Versions 23.0.0 to 23.0.11 and versions 24.0.0 to 24.0.7 of Nextcloud Server are affected by CVE-2022-41969.
To fix CVE-2022-41969, it is recommended to upgrade Nextcloud Server to version 23.0.11, 24.0.7, or 25.0.0 or later, as these versions contain the necessary fix.