{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-37312","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-06-05T20:10:46.498Z","datePublished":"2024-06-14T14:43:24.137Z","dateUpdated":"2024-08-02T03:50:55.709Z"},"containers":{"cna":{"title":"Nextcloud user_oidc app's ID4me feature is available even when disabled","problemTypes":[{"descriptions":[{"cweId":"CWE-284","lang":"en","description":"CWE-284: Improper Access Control","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q","tags":["x_refsource_CONFIRM"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q"},{"name":"https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2","tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2"},{"name":"https://hackerone.com/reports/2376929","tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/2376929"}],"affected":[{"vendor":"nextcloud","product":"security-advisories","versions":[{"version":"<= 1.3.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-06-14T14:43:24.137Z"},"descriptions":[{"lang":"en","value":"user_oidc app is an OpenID Connect user backend for Nextcloud. Missing access control on the ID4me endpoint allows an attacker to register an account eventually getting access to data that is available to all registered users. It is recommended that the OpenID Connect user backend is upgraded to 3.0.0 (Nextcloud 20-23), 4.0.0 (Nexcloud 24) or 5.0.0 (Nextcloud 25-28).\n"}],"source":{"advisory":"GHSA-vw7g-959g-vj6q","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"nextcloud","product":"user_oidc","cpes":["cpe:2.3:a:nextcloud:user_oidc:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"1.3.6","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-14T17:15:53.717769Z","id":"CVE-2024-37312","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-14T17:15:56.731Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T03:50:55.709Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vw7g-959g-vj6q"},{"name":"https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/user_oidc/commit/9f68a716ecd264160a7c098b8840313f1ac855f2"},{"name":"https://hackerone.com/reports/2376929","tags":["x_refsource_MISC","x_transferred"],"url":"https://hackerone.com/reports/2376929"}]}]}}