
Cloud Vulnerability DB
A community-led vulnerabilities database
Nextcloud Server, a self-hosted productivity platform's file server software, was found to have a vulnerability prior to versions 22.2.7 and 23.0.4. The vulnerability (CVE-2022-29243) was related to missing input-size validation of new session names, which allowed users to create app passwords with long names (GitHub Advisory).
The vulnerability stems from improper input validation where the system failed to enforce size limits on session names when creating app passwords. These long names would then be loaded into memory during usage, which could impact system performance. The vulnerability has been assigned a CVSS v3.1 score of 4.3 (MEDIUM) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L (GitHub Advisory).
The primary impact of this vulnerability is on system performance. When exploited, the vulnerability could lead to impacted performance due to long session names being loaded into memory during usage (GitHub Advisory).
The vulnerability has been patched in Nextcloud Server versions 22.2.7 and 23.0.4. It is recommended to upgrade to these versions or later. No workarounds are available for this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."