Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-32733— XSS in Nextcloud Text application

CVSS 4.8 · Medium EPSS 0.17% · P37
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-32733

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
XSS in Nextcloud Text application
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nextcloud Text is a collaborative document editing application that uses Markdown. A cross-site scripting vulnerability is present in versions prior to 19.0.13, 20.0.11, and 21.0.3. The Nextcloud Text application shipped with Nextcloud server used a `text/html` Content-Type when serving files to users. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, use a browser that has support for Content-Security-Policy.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nextcloud 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nextcloud是德国Nextcloud公司的一套开源的自托管文件同步和共享的通信应用平台。 Nextcloud Text在19.0.13、20.0.11和21.0.3之前的版本中存在跨站脚本漏洞,该漏洞是一个跨站脚本漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nextcloudsecurity-advisories < 19.0.13 -

II. Public POCs for CVE-2021-32733

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-32733

登录查看更多情报信息。

Same Patch Batch · nextcloud · 2021-07-12 · 14 CVEs total

CVE-2021-326888.8 HIGHApplication specific tokens can change their own scope
CVE-2021-326898.1 HIGHNextcloud Talk not properly disassociating users from chats after account deletion
CVE-2021-327267.1 HIGHWebauthn tokens not removed after user has been deleted
CVE-2021-327275.7 MEDIUMEnd-to-end encryption device setup did not verify public key
CVE-2021-327415.3 MEDIUMLack of ratelimit on public share link mount endpoint
CVE-2021-327055.3 MEDIUMLack of ratelimit on public DAV endpoint
CVE-2021-327035.3 MEDIUMLack of ratelimit on shareinfo endpoint
CVE-2021-327074.3 MEDIUMBypass of image blocking in Nextcloud Mail
CVE-2021-326783.7 LOWRatelimit not applied on OCS API responses
CVE-2021-327253.5 LOWDefault share permissions not respected for federated reshares
CVE-2021-326793.5 LOWFilenames not escaped by default in controllers using DownloadResponse
CVE-2021-326803.3 LOWAudit log is not properly logging unsetting of share expiration date
CVE-2021-327343.1 LOWFile path disclosure of shared files in Nextcloud Text application

IV. Related Vulnerabilities

V. Comments for CVE-2021-32733

No comments yet


Leave a comment