A cross-site scripting vulnerability exists in Rocket.chat <v5 due to style injection in the complete chat window, an adversary is able to manipulate not only the style of it, but will also be able to block functionality as well as hijacking the content of targeted users. Hence the payloads are stored in messages, it is a persistent attack vector, which will trigger as soon as the message gets viewed.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1401268 | Exploit Issue Tracking Third Party Advisory |
https://hackerone.com/reports/1401268 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/1401268 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2022-09-23 19:15
Updated : 2024-11-21 07:10
NVD link : CVE-2022-35251
Mitre link : CVE-2022-35251
CVE.ORG link : CVE-2022-35251
JSON object : View
Products Affected
rocket.chat
- rocket.chat
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')