Nextcloud Server <23.0.10 / 24.0.6 | DDoS via loggedin DB/CPU load (Circles)
CVE-2022-39330 Published on October 27, 2022
Database resource exhaustion for logged-in users via sharee recommendations with circles
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server prior to versions 22.2.10, 23.0.10, and 24.0.6 are vulnerable to a logged-in attacker slowing down the system by generating a lot of database/cpu load. Nextcloud Server versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server versions 22.2.10, 23.0.10, and 24.0.6 contain patches for this issue. As a workaround, disable the Circles app.
Vulnerability Analysis
CVE-2022-39330 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2022-39330 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2022-39330
Want to know whenever a new CVE is published for Nextcloud products? stack.watch will email you.
Affected Versions
nextcloud security-advisories:- Version >= 23.0.0, < 23.0.9 is affected.
- Version >= 24.0.0, < 24.0.5 is affected.
- Version < 22.2.10 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.