Описание
The Nextcloud dialogs library (npm package @nextcloud/dialogs) before 3.1.2 insufficiently escaped text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. The vulnerability has been patched in version 3.1.2 If you need to display HTML in the toast, explicitly pass the options.isHTML config flag.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.2 (исключая)
cpe:2.3:a:nextcloud\/dialogs_project:nextcloud\/dialogs:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 45%
0.00224
Низкий
4.6 Medium
CVSS3
5.4 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 4.6
github
почти 5 лет назад
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs
EPSS
Процентиль: 45%
0.00224
Низкий
4.6 Medium
CVSS3
5.4 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79