Lucene search

K
hackeroneMikeisastarH1:1707977
HistorySep 21, 2022 - 10:00 p.m.

Nextcloud: XSS in Desktop Client via user status and information

2022-09-2122:00:01
mikeisastar
hackerone.com
21
nextcloud
desktop client
xss
hypertext markup language
windows 10
security flaw
bug bounty

EPSS

0.001

Percentile

26.4%

Summary:

The Nextcloud Desktop Client application does not properly neutralize the Full Name and Status Message of users before using them.

Steps To Reproduce:

Server Machine:

  1. Install the Nextcloud Server application
  2. Log into your account
  3. Navigate to your profile page
  4. Set the Full Name of your user to <img src="https://avatars.githubusercontent.com/u/99037623">
  5. Set the Status Message of your user to <img src="https://avatars.githubusercontent.com/u/99037623">

Client Machine:

  1. Install the Nextcloud Desktop Client application onto a machine that is running the Windows 10 operating system
  2. Log into your account
  3. Open the main dialog window of the Nextcloud Desktop Client application
  4. Observe that the Full Name and Status Message of your user are treated as HyperText Markup Language

Supporting Material/References:

{F1945608}

Impact

An attacker can inject arbitrary HyperText Markup Language into the Nextcloud Desktop Client application.