First published: Mon May 08 2017(Updated: )
Nextcloud Server before 9.0.58 and 10.0.5 and 11.0.3 are shipping a vulnerable JavaScript library for sanitizing untrusted user-input which suffered from a XSS vulnerability caused by a behaviour change in Safari 10.1 and 10.2. Note that Nextcloud employs a strict Content-Security-Policy preventing exploitation of this XSS issue on modern web browsers.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <9.0.58 | |
Nextcloud Server | >=10.0.0<10.0.5 | |
Nextcloud Server | >=11.0.0<11.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0893 is classified as a medium severity vulnerability due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2017-0893, upgrade Nextcloud Server to version 9.0.58 or later, or versions 10.0.5 or later, or 11.0.3 or later.
CVE-2017-0893 affects Nextcloud Server versions prior to 9.0.58, 10.0.5, and 11.0.3.
CVE-2017-0893 is a cross-site scripting (XSS) vulnerability that arises from the use of a vulnerable JavaScript library.
CVE-2017-0893 primarily affects users of Safari 10.1 and 10.2 due to a specific behavior change in these versions.