Upstream information
CVE-2022-39332 at MITRE
Description
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CVSS v3 Scores
| National Vulnerability Database |
Base Score | 5.4 |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | Required |
Scope | Changed |
Confidentiality Impact | Low |
Integrity Impact | Low |
Availability Impact | None |
CVSSv3 Version | 3.1 |
SUSE Bugzilla entry:
1205799 [RESOLVED / FIXED]
SUSE Security Advisories:
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Package Hub 15 SP4 | caja-extension-nextcloud >= 3.8.0-bp154.2.3.1
cloudproviders-extension-nextcloud >= 3.8.0-bp154.2.3.1
libnextcloudsync-devel >= 3.8.0-bp154.2.3.1
libnextcloudsync0 >= 3.8.0-bp154.2.3.1
nautilus-extension-nextcloud >= 3.8.0-bp154.2.3.1
nemo-extension-nextcloud >= 3.8.0-bp154.2.3.1
nextcloud-desktop >= 3.8.0-bp154.2.3.1
nextcloud-desktop-doc >= 3.8.0-bp154.2.3.1
nextcloud-desktop-dolphin >= 3.8.0-bp154.2.3.1
nextcloud-desktop-lang >= 3.8.0-bp154.2.3.1
| Patchnames: openSUSE-2023-90 |
SUSE Package Hub 15 SP5 | caja-extension-nextcloud >= 3.8.0-bp155.2.3.1
cloudproviders-extension-nextcloud >= 3.8.0-bp155.2.3.1
libnextcloudsync-devel >= 3.8.0-bp155.2.3.1
libnextcloudsync0 >= 3.8.0-bp155.2.3.1
nautilus-extension-nextcloud >= 3.8.0-bp155.2.3.1
nemo-extension-nextcloud >= 3.8.0-bp155.2.3.1
nextcloud-desktop >= 3.8.0-bp155.2.3.1
nextcloud-desktop-doc >= 3.8.0-bp155.2.3.1
nextcloud-desktop-dolphin >= 3.8.0-bp155.2.3.1
nextcloud-desktop-lang >= 3.8.0-bp155.2.3.1
| Patchnames: openSUSE-2023-171 |
openSUSE Leap 15.4 | caja-extension-nextcloud >= 3.8.0-bp154.2.3.1
cloudproviders-extension-nextcloud >= 3.8.0-bp154.2.3.1
libnextcloudsync-devel >= 3.8.0-bp154.2.3.1
libnextcloudsync0 >= 3.8.0-bp154.2.3.1
nautilus-extension-nextcloud >= 3.8.0-bp154.2.3.1
nemo-extension-nextcloud >= 3.8.0-bp154.2.3.1
nextcloud-desktop >= 3.8.0-bp154.2.3.1
nextcloud-desktop-doc >= 3.8.0-bp154.2.3.1
nextcloud-desktop-dolphin >= 3.8.0-bp154.2.3.1
nextcloud-desktop-lang >= 3.8.0-bp154.2.3.1
| Patchnames: openSUSE-2023-90 |
openSUSE Leap 15.5 | caja-extension-nextcloud >= 3.8.0-bp155.2.3.1
cloudproviders-extension-nextcloud >= 3.8.0-bp155.2.3.1
libnextcloudsync-devel >= 3.8.0-bp155.2.3.1
libnextcloudsync0 >= 3.8.0-bp155.2.3.1
nautilus-extension-nextcloud >= 3.8.0-bp155.2.3.1
nemo-extension-nextcloud >= 3.8.0-bp155.2.3.1
nextcloud-desktop >= 3.8.0-bp155.2.3.1
nextcloud-desktop-doc >= 3.8.0-bp155.2.3.1
nextcloud-desktop-dolphin >= 3.8.0-bp155.2.3.1
nextcloud-desktop-lang >= 3.8.0-bp155.2.3.1
| Patchnames: openSUSE-2023-171 |
SUSE Timeline for this CVE
CVE page created: Fri Nov 25 23:00:14 2022
CVE page last modified: Mon Jul 10 19:55:43 2023