First published: Thu Jan 18 2024(Updated: )
Nextcloud Global Site Selector is a tool which allows you to run multiple small Nextcloud instances and redirect users to the right server. A problem in the password verification method allows an attacker to authenticate as another user. It is recommended that the Nextcloud Global Site Selector is upgraded to version 1.4.1, 2.1.2, 2.3.4 or 2.4.5. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Global Site Selector | >=1.1.0<1.4.1 | |
Nextcloud Global Site Selector | >=2.0.0<2.1.2 | |
Nextcloud Global Site Selector | >=2.2.0<2.3.4 | |
Nextcloud Global Site Selector | >=2.4.0<2.4.5 |
https://github.com/nextcloud/globalsiteselector/commit/ab5da57190d5bbc79079ce4109b6bcccccd893ee
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22212 is rated as a critical vulnerability due to its potential for severe unauthorized access.
To remediate CVE-2024-22212, update your Nextcloud Global Site Selector to version 2.4.6 or later immediately.
CVE-2024-22212 could allow an attacker to authenticate as another user, leading to data breaches or unauthorized actions.
CVE-2024-22212 affects Nextcloud Global Site Selector versions 1.1.0 to 1.4.1, and 2.0.0 to 2.4.5.
Fixes for CVE-2024-22212 have been released in the latest version, and users should upgrade as soon as possible.