5.4

CVE-2023-48301

Exploit

Nextcloud Server HTML injection in search UI when selecting a circle with HTML in the display name

HTML injection in search UI when selecting a circle with HTML in the display name

Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
Mögliche Gegenmaßnahme
Server: * Disable app circles
Enterprise Server: * Disable app circles
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NextcloudNextcloud Server SwEdition- Version >= 25.0.0 <= 25.0.13
NextcloudNextcloud Server SwEditionenterprise Version >= 25.0.0 < 25.0.13
NextcloudNextcloud Server SwEdition- Version >= 26.0.0 <= 26.0.8
NextcloudNextcloud Server SwEditionenterprise Version >= 26.0.0 < 26.0.8
NextcloudNextcloud Server SwEdition- Version >= 27.0.0 <= 27.1.3
NextcloudNextcloud Server SwEditionenterprise Version >= 27.0.0 < 27.1.3
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemNextcloud
Produkt Server
Version >= 25.0.0, < 25.0.13
Version >= 26.0.0, < 26.0.8
Version >= 27.0.0, < 27.1.3
SystemNextcloud
Produkt Enterprise Server
Version >= 25.0.0, < 25.0.13
Version >= 26.0.0, < 26.0.8
Version >= 27.0.0, < 27.1.3
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.39% 0.593
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
security-advisories@github.com 3.5 2.1 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.