First published: Tue Mar 08 2022(Updated: )
Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Talk Android | <12.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-41180 is medium (6.1).
Versions prior to 12.1.2 of Nextcloud Talk Android are affected by CVE-2021-41180.
An attacker can exploit CVE-2021-41180 by controlling the link of a geolocation preview in the Nextcloud Talk application, resulting in an open-redirect.
Yes, user interaction is required for the exploitation of CVE-2021-41180.
Yes, you can find references for CVE-2021-41180 at the following links: [GitHub Advisory](https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92), [GitHub Pull Request](https://github.com/nextcloud/spreed/pull/6239), [HackerOne Report](https://hackerone.com/reports/1337178).