user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings).
References
Link | Resource |
---|---|
https://hackerone.com/reports/1687005 | Permissions Required Third Party Advisory |
https://github.com/nextcloud/user_oidc/pull/495 | Patch Third Party Advisory |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vff-cq8h-chhg | Patch Third Party Advisory |
Configurations
Information
Published : 2022-11-25 11:15
Updated : 2022-12-01 12:43
NVD link : CVE-2022-39339
Mitre link : CVE-2022-39339
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
nextcloud
- openid_connect_user_backend