Skip to main content

CVE-2022-24887: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in nextcloud security-advisories

Medium
Published: Wed Apr 27 2022 (04/27/2022, 13:55:11 UTC)
Source: CVE
Vendor/Project: nextcloud
Product: security-advisories

Description

Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/22/2025, 02:05:36 UTC

Technical Analysis

CVE-2022-24887 is an open redirect vulnerability (CWE-601) affecting Nextcloud Talk, a video and audio conferencing application integrated into the Nextcloud self-hosted productivity platform. The vulnerability exists in versions prior to 11.3.4, 12.2.2, and 13.0.0. Specifically, when users share a Deck card within a conversation, the metaData associated with that card can be manipulated by an attacker. This manipulation allows the injection of arbitrary URLs that, when clicked by users, redirect them to untrusted external websites. This open redirect flaw can be exploited to facilitate phishing attacks, social engineering, or redirect users to malicious sites hosting malware or credential harvesting pages. The vulnerability does not require authentication or user privileges beyond the ability to share Deck cards in conversations, making it accessible to any user with sharing capabilities. There are no known workarounds, but the issue is fixed in the specified patched versions. No known exploits are currently observed in the wild. The vulnerability impacts confidentiality and integrity indirectly by enabling phishing and social engineering attacks, while availability is not directly affected. The flaw arises from insufficient validation or sanitization of URLs in the Deck card metaData, allowing redirection to arbitrary external domains.

Potential Impact

For European organizations using Nextcloud Talk, especially those deploying versions prior to the patched releases, this vulnerability poses a moderate risk. Attackers could leverage the open redirect to craft convincing phishing campaigns targeting employees, partners, or customers, potentially leading to credential theft, unauthorized access, or malware infections. Organizations in sectors with high reliance on secure communications, such as finance, healthcare, and government, may face increased risks due to the potential for social engineering attacks exploiting this vulnerability. The self-hosted nature of Nextcloud means that organizations controlling their own instances must proactively update to mitigate exposure. The indirect nature of the impact means that while the platform itself is not compromised, the trust in communications can be undermined, leading to reputational damage and potential data breaches if phishing is successful.

Mitigation Recommendations

1. Immediate upgrade of Nextcloud Talk to versions 11.3.4, 12.2.2, or 13.0.0 or later to apply the official patch addressing the open redirect vulnerability. 2. Implement strict URL filtering and validation on user-generated content, particularly Deck card metaData, to prevent injection of untrusted URLs. 3. Educate users to be cautious when clicking on links shared within Nextcloud Talk conversations, especially those originating from unexpected or unknown sources. 4. Deploy web security gateways or email security solutions capable of detecting and blocking phishing URLs and malicious redirects. 5. Monitor Nextcloud Talk logs for unusual sharing activity or patterns indicative of exploitation attempts. 6. For organizations unable to immediately patch, consider restricting Deck card sharing permissions to trusted users only or disabling the feature temporarily until patched. 7. Conduct regular security awareness training emphasizing the risks of open redirects and social engineering attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf644c

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 2:05:36 AM

Last updated: 8/1/2025, 12:31:28 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats