Vulnerability Details : CVE-2022-31132
Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions shipped with a CSS minifier on the path `./vendor/cerdic/css-tidy/css_optimiser.php`. Access to the minifier is unrestricted and access may lead to Server-Side Request Forgery (SSRF). It is recommendet to upgrade to Mail 1.12.7 or Mail 1.13.6. Users unable to upgrade may manually delete the file located at `./vendor/cerdic/css-tidy/css_optimiser.php`
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2022-31132
- cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*
- cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31132
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31132
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
8.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L |
3.9
|
3.7
|
GitHub, Inc. |
CWE ids for CVE-2022-31132
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-31132
-
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-24pm-rjfv-23mh
Unauthenticated SSRF in 3rd party module "cerdic/csstidy" · Advisory · nextcloud/security-advisories · GitHubThird Party Advisory
Jump to