First published: Mon Nov 15 2021(Updated: )
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud talk | <10.0.7 | |
Nextcloud talk | >=10.1.0<10.1.4 | |
Nextcloud talk | >=11.0.0<11.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39222 is a Cross-Site Scripting (XSS) vulnerability in the Nextcloud Talk application.
The severity of CVE-2021-39222 is medium with a CVSS score of 6.1.
To exploit CVE-2021-39222, a user needs to right-click on a malicious file and open it in a new tab.
Versions 10.0.7 to 10.1.4 and versions 11.0.0 to 11.1.2 of Nextcloud Talk are affected by CVE-2021-39222.
Yes, you can find more information about CVE-2021-39222 on the following references: [1] [2] [3].