Stored XSS in markdown file with Nextcloud Talk using Internet Explorer
Low
Vulnerability Details
While editing a markdown file through the text app, users can create link elements that have a javascript URL such as `javascript:alert(1)`.
Steps to reproduce:
* While editing a markdown file, select some text and click the "Add Link" button.
* Using a web proxy, intercept the request and change the href value to `javascript:alert(1)`.
{F1060394}
* Refresh the document and click the malicious link created to fire the payload.
{F1060397}
Note that CSP blocks the javascript from running, but browsers such as IE are still vulnerable.
{F1060402}
## Impact
An attacker could execute arbitrary JavaScript code on the web browser of a victim who opens the file and clicks the malicious link.
Actions
View on HackerOneReport Stats
- Report ID: 1023787
- State: Closed
- Substate: resolved
- Upvotes: 12