CVE-2022-41971

Source
https://cve.org/CVERecord?id=CVE-2022-41971
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-41971.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-41971
Aliases
  • GHSA-wx6w-xpg9-6fv4
Published
2022-12-01T20:55:46.040Z
Modified
2025-11-28T05:02:25.917142Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Nextcloud Talk guests can continue to receive video streams from call after being removed from a conversation
Details

Nextcould Talk android is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0, guests can continue to receive video streams from a call after being removed from a conversation. An attacker would be able to see videos on a call in a public conversation after being removed from that conversation, provided that they were removed while being in the call. Versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0 contain patches for the issue. No known workarounds are available.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/41xxx/CVE-2022-41971.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-200",
        "CWE-359"
    ]
}
References

Affected packages

Git / github.com/nextcloud/spreed

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "12.2.8"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Database specific
{
    "versions": [
        {
            "introduced": "13.0.0"
        },
        {
            "fixed": "13.0.10"
        }
    ]
}
Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Database specific
{
    "versions": [
        {
            "introduced": "14.0.0"
        },
        {
            "fixed": "14.0.6"
        }
    ]
}

Affected versions

v1.*
v1.0.21
v1.0.22
v1.1
v1.1.2
v1.2
v10.*
v10.0.0-beta.1
v10.0.0-beta.2
v10.0.0-rc.1
v11.*
v11.0.0-alpha.1
v11.0.0-alpha.2
v11.0.0-alpha.3
v11.0.0-alpha.4
v12.*
v12.0.0
v12.0.0-alpha.1
v12.0.0-alpha.2
v12.0.0-alpha.3
v12.0.0-alpha.4
v12.0.0-rc.1
v12.1.0
v12.1.1
v12.2.0
v12.2.1
v12.2.2
v12.2.3
v12.2.4
v12.2.5
v12.2.6
v12.2.7
v13.*
v13.0.0
v13.0.1
v13.0.1.1
v13.0.2
v13.0.3
v13.0.4
v13.0.5
v13.0.6
v13.0.7
v13.0.8
v13.0.9
v14.*
v14.0.0
v14.0.1
v14.0.2
v14.0.3
v14.0.4
v14.0.5
v2.*
v2.0.0
v2.9.0
v2.9.1
v3.*
v3.0.0
v3.0.1
v3.99.10
v3.99.11
v3.99.12
v3.99.8
v4.*
v4.0.0
v4.99.5
v5.*
v5.99.10
v6.*
v6.0.0-rc.1
v6.0.0-rc.2
v7.*
v7.0.0-beta.1
v8.*
v8.0.0
v8.0.0-alpha.1
v8.0.0-alpha.2
v8.0.0-alpha.3
v8.0.0-alpha.4
v8.0.0-alpha.5
v8.0.0-alpha.6
v9.*
v9.0.0-beta.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-41971.json"