Lucene search

K
hackeroneVergH1:1023787
HistoryNov 01, 2020 - 10:41 a.m.

Nextcloud: Stored XSS in markdown file with Nextcloud Talk using Internet Explorer

2020-11-0110:41:13
verg
hackerone.com
36

0.001 Low

EPSS

Percentile

21.8%

While editing a markdown file through the text app, users can create link elements that have a javascript URL such as javascript:alert(1).

Steps to reproduce:

  • While editing a markdown file, select some text and click the “Add Link” button.
  • Using a web proxy, intercept the request and change the href value to javascript:alert(1).

{F1060394}

  • Refresh the document and click the malicious link created to fire the payload.

{F1060397}

Note that CSP blocks the javascript from running, but browsers such as IE are still vulnerable.

{F1060402}

Impact

An attacker could execute arbitrary JavaScript code on the web browser of a victim who opens the file and clicks the malicious link.

0.001 Low

EPSS

Percentile

21.8%