{"id":"CVE-2022-39346","summary":"Missing length validation of user displayname in nextcloud server","details":"Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.","aliases":["GHSA-6w9f-jgjx-4vj6"],"modified":"2026-04-10T04:50:22.756135Z","published":"2022-11-25T00:00:00Z","related":["openSUSE-SU-2023:0083-1"],"database_specific":{"cwe_ids":["CWE-20","CWE-400"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39346.json"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1588562"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39346.json"},{"type":"ADVISORY","url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TARDPRPBTI5TJRBYRVVQGTL6KWRCV5/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R32L3P53AQKQQC652LA5U3AWFTZKPDK3/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRAER4DCCHHSUDFHQ6LTIH4JEJFF73IU/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39346"},{"type":"FIX","url":"https://github.com/nextcloud/server/pull/33052"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nextcloud/server","events":[{"introduced":"0"},{"fixed":"b3b27e3f1605ee0e5bd99d72badf1b0d704032e5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"22.2.10"}]}},{"type":"GIT","repo":"https://github.com/nextcloud/server","events":[{"introduced":"0619207f13792250aea775a2c3133d41ab625980"},{"fixed":"1debe060a87e1d50e18dd47b29ea32de3dc4bac6"}],"database_specific":{"versions":[{"introduced":"23.0.0"},{"fixed":"23.0.7"}]}},{"type":"GIT","repo":"https://github.com/nextcloud/server","events":[{"introduced":"5f37aacb3194d51503aaa3529ae8f676b32a25d7"},{"fixed":"7844c0bce1f8a5b495c86c7a09bcd862ed06d90a"}],"database_specific":{"versions":[{"introduced":"24.0.0"},{"fixed":"24.0.3"}]}}],"versions":["22.1.0","v1.0.0beta1","v11.0.0","v11.0RC2","v12.0.0beta1","v12.0.0beta2","v12.0.0beta3","v12.0.0beta4","v13.0.0RC1","v13.0.0beta1","v13.0.0beta2","v13.0.0beta3","v13.0.0beta4","v14.0.0RC1","v14.0.0RC2","v14.0.0beta1","v14.0.0beta2","v14.0.0beta3","v14.0.0beta4","v15.0.0RC1","v15.0.0beta1","v15.0.0beta2","v16.0.0RC1","v16.0.0alpha1","v16.0.0beta1","v16.0.0beta2","v16.0.0beta3","v17.0.0beta1","v17.0.0beta2","v17.0.0beta3","v17.0.0beta4","v18.0.0RC1","v18.0.0beta1","v18.0.0beta2","v18.0.0beta3","v18.0.0beta4","v19.0.0RC1","v19.0.0RC2","v19.0.0beta1","v19.0.0beta2","v19.0.0beta3","v19.0.0beta4","v19.0.0beta5","v19.0.0beta6","v19.0.0beta7","v20.0.0RC1","v20.0.0beta1","v20.0.0beta2","v20.0.0beta3","v20.0.0beta4","v21.0.0beta1","v21.0.0beta2","v21.0.0beta3","v21.0.0beta4","v21.0.0beta5","v21.0.0beta6","v21.0.0beta7","v21.0.0beta8","v22.0.0","v22.0.0beta1","v22.0.0beta2","v22.0.0beta4","v22.0.0beta5","v22.0.0rc1","v22.0.0rc2","v22.1.0","v22.1.0rc1","v22.1.1","v22.1.1rc1","v22.1.1rc2","v22.2.0","v22.2.0rc2","v22.2.1","v22.2.10rc1","v22.2.10rc2","v22.2.1rc1","v22.2.2","v22.2.3","v22.2.4","v22.2.4rc1","v22.2.4rc2","v22.2.4rc3","v22.2.5","v22.2.5rc1","v22.2.6","v22.2.6rc1","v22.2.6rc2","v22.2.7","v22.2.7rc1","v22.2.8","v22.2.8rc1","v22.2.9","v22.2.9rc1","v23.0.0","v23.0.1","v23.0.1rc1","v23.0.1rc2","v23.0.1rc3","v23.0.2","v23.0.2rc1","v23.0.3","v23.0.3rc1","v23.0.3rc2","v23.0.4","v23.0.4rc1","v23.0.5","v23.0.5rc1","v23.0.6","v23.0.6rc1","v23.0.7rc1","v23.0.7rc2","v24.0.0","v24.0.1","v24.0.1rc1","v24.0.2","v24.0.2rc1","v24.0.3rc1","v24.0.3rc2","v3.0","v4.0.0","v4.0.0RC","v4.0.0RC2","v4.0.0beta","v4.0.1","v4.0.4","v4.0.5","v4.0.6","v4.5.0","v4.5.0RC1","v4.5.0RC2","v4.5.0RC3","v4.5.0beta3","v4.5.0beta4","v5.0.0","v5.0.0RC1","v5.0.0RC2","v5.0.0RC3","v5.0.0alpha1","v5.0.0beta1","v5.0.0beta2","v6.0.0RC1","v6.0.0RC2","v6.0.0alpha2","v6.0.0beta2","v6.0.0beta3","v6.0.0beta4","v6.0.0beta5","v7.0.0alpha2","v7.0.0beta1","v8.0.0","v8.0.0RC1","v8.0.0RC2","v8.0.0alpha1","v8.0.0alpha2","v8.0.0beta1","v8.0.0beta2","v8.1.0alpha1","v8.1.0alpha2","v8.1.0beta1","v8.1.0beta2","v8.1RC2","v8.2RC1","v8.2beta1","v9.0.0beta2","v9.0beta1","v9.1.0beta1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39346.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"}]}