Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92 | Issue Tracking Third Party Advisory |
https://github.com/nextcloud/spreed/pull/6239 | Patch Third Party Advisory |
https://hackerone.com/reports/1337178 | Exploit Patch Third Party Advisory |
Configurations
Information
Published : 2022-03-08 10:15
Updated : 2022-03-15 09:18
NVD link : CVE-2021-41180
Mitre link : CVE-2021-41180
JSON object : View
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Products Affected
nextcloud
- talk