Stored XSS in markdown file with Nextcloud Talk using Internet Explorer

Disclosed: 2021-02-19 12:08:10 By verg To nextcloud
Low
Vulnerability Details
While editing a markdown file through the text app, users can create link elements that have a javascript URL such as `javascript:alert(1)`. Steps to reproduce: * While editing a markdown file, select some text and click the "Add Link" button. * Using a web proxy, intercept the request and change the href value to `javascript:alert(1)`. {F1060394} * Refresh the document and click the malicious link created to fire the payload. {F1060397} Note that CSP blocks the javascript from running, but browsers such as IE are still vulnerable. {F1060402} ## Impact An attacker could execute arbitrary JavaScript code on the web browser of a victim who opens the file and clicks the malicious link.
Actions
View on HackerOne
Report Stats
  • Report ID: 1023787
  • State: Closed
  • Substate: resolved
  • Upvotes: 12
Share this report