Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs
Moderate severity
GitHub Reviewed
Published
Apr 13, 2021
in
nextcloud-libraries/nextcloud-dialogs
•
Updated Feb 1, 2023
Description
Reviewed
Apr 13, 2021
Published by the National Vulnerability Database
Apr 13, 2021
Published to the GitHub Advisory Database
Apr 16, 2021
Last updated
Feb 1, 2023
Impact
The Nextcloud dialogs library before 3.1.2 did insufficiently escape text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability.
Note: Nextcloud Server employs a strict Content Security Policy that mitigates the risk of these XSS vulnerabilities.
Patches
The vulnerability has been patched in version 3.1.2. If you need to display HTML in the toast, explicitly pass the
options.isHTML
config flag.Workarounds
Make sure no user-supplied input flows into toasts.
References