Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions users could be tricked into executing malicious code that would execute in their browser via HTML sent as a comment. It is recommended that the Nextcloud Deck is upgraded to version 1.9.5 or 1.11.2. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/nextcloud/deck/commit/91f1557362047f8840f53151f176b80148650bcd | Patch |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mg7w-x9fm-9wwc | Exploit Patch Vendor Advisory |
https://hackerone.com/reports/2058556 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-01-18 20:15
Updated : 2024-01-25 15:10
NVD link : CVE-2024-22213
Mitre link : CVE-2024-22213
CVE.ORG link : CVE-2024-22213
JSON object : View
Products Affected
nextcloud
- deck
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')