Vulnerability Name: | CVE-2021-22878 (CCN-197701) | ||||||||||||
Assigned: | 2021-01-25 | ||||||||||||
Published: | 2021-01-25 | ||||||||||||
Updated: | 2022-01-01 | ||||||||||||
Summary: | Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`. | ||||||||||||
CVSS v3 Severity: | 4.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:L/E:H/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-22878 Source: XF Type: UNKNOWN nextcloud-cve202122878-xss(197701) Source: MISC Type: Patch, Third Party Advisory https://github.com/nextcloud/server/pull/25234 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://hackerone.com/reports/896522 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-eac0e52f88 Source: CCN Type: NC-SA-2021-005 Reflected XSS when renaming malicious file Source: MISC Type: Vendor Advisory https://nextcloud.com/security/advisory/?id=NC-SA-2021-005 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |