Some HTML Tags are Getting Executed in com.nextcloud.client
None
Vulnerability Details
###What is the Vulnerability?
HTML Tags such as <h1> , <small> , <href> and <img> are Getting Executed in Next Cloud Client Mobile Application for Android which can then Results to Code Injection.
###Reproduction Steps
1.) Using Next Cloud Client Mobile App on Android, Rename a Folder to ```<a href="google.com">test```
Our HTML tag Was Executed
{F518303}
2.)Rename the folder to ```small<h1>BIG```
Our HTML tag Was Executed
{F518304}
3.) Rename the Folder to ```normal<small>small<h1>BIG```
Our HTML tag Was Executed
{F518305}
## Impact
If successfully exploited, impact could cover loss of confidentiality, loss of integrity, loss of availability, and/or loss of accountability
Actions
View on HackerOneReport Stats
- Report ID: 631227
- State: Closed
- Substate: resolved
- Upvotes: 9