XSS via HTML in comments in Nextcloud Deck before 1.11.2
CVE-2024-22213 Published on January 18, 2024

Cross-site Scripting when sending HTML as a comment in the Nextcloud Deck app
Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions users could be tricked into executing malicious code that would execute in their browser via HTML sent as a comment. It is recommended that the Nextcloud Deck is upgraded to version 1.9.5 or 1.11.2. There are no known workarounds for this vulnerability.

NVD

Vulnerability Analysis

CVE-2024-22213 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

What is a XSS Vulnerability?

The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

CVE-2024-22213 has been classified to as a XSS vulnerability or weakness.


Products Associated with CVE-2024-22213

Want to know whenever a new CVE is published for Nextcloud Deck? stack.watch will email you.

 

Affected Versions

nextcloud security-advisories:

Exploit Probability

EPSS
0.37%
Percentile
58.49%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.