Lucene search

K
nextcloudNextcloudGHSA-XHXQ-F4VG-JW5G
HistoryOct 25, 2021 - 10:59 a.m.

XSS in Talk

2021-10-2510:59:46
github.com
19

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

31.8%

Description

Impact

The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab.

Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy.

Patches

It is recommended that the Nextcloud Talk application is upgraded to 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0.

Workarounds

Use a browser that has support for Content-Security-Policy. You can find a list of supported browsers on caniuse.com. A notable exemption is Internet Explorer which does not support CSP properly.

References

For more information

If you have any questions or comments about this advisory:

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

31.8%

Related for GHSA-XHXQ-F4VG-JW5G