CVE-2021-39222 is a vulnerability in Nextcloud Talk
Published on November 15, 2021
XSS in Talk
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.
Vulnerability Analysis
CVE-2021-39222 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Types
What is an Unrestricted File Upload Vulnerability?
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
CVE-2021-39222 has been classified to as an Unrestricted File Upload vulnerability or weakness.
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2021-39222 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2021-39222
Want to know whenever a new CVE is published for Nextcloud Talk? stack.watch will email you.
Affected Versions
nextcloud security-advisories:- Version < 10.0.7 is affected.
- Version >= 10.1.0, < 10.1.4 is affected.
- Version >= 11.1.0, < 11.1.2 is affected.
- Version < 11.2.0 is affected.
- Version >= 12.0.0.alpha-1, < 12.0.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.