Some HTML Tags are Getting Executed in com.nextcloud.client

Disclosed: 2019-07-26 08:02:14 By ctulhu To nextcloud
None
Vulnerability Details
###What is the Vulnerability? HTML Tags such as <h1> , <small> , <href> and <img> are Getting Executed in Next Cloud Client Mobile Application for Android which can then Results to Code Injection. ###Reproduction Steps 1.) Using Next Cloud Client Mobile App on Android, Rename a Folder to ```<a href="google.com">test``` Our HTML tag Was Executed {F518303} 2.)Rename the folder to ```small<h1>BIG``` Our HTML tag Was Executed {F518304} 3.) Rename the Folder to ```normal<small>small<h1>BIG``` Our HTML tag Was Executed {F518305} ## Impact If successfully exploited, impact could cover loss of confidentiality, loss of integrity, loss of availability, and/or loss of accountability
Actions
View on HackerOne
Report Stats
  • Report ID: 631227
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report