Vulnerability Details : CVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available.
Products affected by CVE-2022-31120
- cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31120
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31120
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.7
|
LOW | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
1.2
|
1.4
|
NIST | |
2.1
|
LOW | CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N |
0.7
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2022-31120
-
When a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2022-31120
-
https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655
Log in audit log federated shares events by CarlSchwan · Pull Request #31594 · nextcloud/server · GitHubPatch;Third Party Advisory
-
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x
Federated share accepting/declining is not logged in audit log · Advisory · nextcloud/security-advisories · GitHubThird Party Advisory
-
https://portal.nextcloud.com/article/using-the-audit-log-44.html
Using the audit logVendor Advisory
Jump to