Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/nextcloud/desktop/pull/4972 | Patch Third Party Advisory |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p | Third Party Advisory |
https://hackerone.com/reports/1707977 | Exploit Third Party Advisory |
https://github.com/nextcloud/desktop/pull/4972 | Patch Third Party Advisory |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p | Third Party Advisory |
https://hackerone.com/reports/1707977 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
References | () https://github.com/nextcloud/desktop/pull/4972 - Patch, Third Party Advisory | |
References | () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p - Third Party Advisory | |
References | () https://hackerone.com/reports/1707977 - Exploit, Third Party Advisory |
Information
Published : 2022-11-25 20:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-39332
Mitre link : CVE-2022-39332
CVE.ORG link : CVE-2022-39332
JSON object : View
Products Affected
nextcloud
- desktop
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')