7 results (0.008 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. The unsanitized SVG is converted to a JavaScript blob (in memory data) that the Avatar can't render. Due to this constellation the missing sanitization does not seem to be exploitable. It is recommended that the Contacts app is upgraded to 5.0.3 or 4.2.4 • https://github.com/nextcloud/contacts/pull/3199 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hxr6-cx85-gcjx https://hackerone.com/reports/1789602 • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

Insecure storage of device information in Contacts prior to version 12.7.05.24 allows attacker to get Samsung Account ID. Un almacenamiento no seguro de la información del dispositivo en Contacts versiones anteriores a 12.7.05.24, permite a un atacante conseguir el ID de la cuenta de Samsung • https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=12 • CWE-922: Insecure Storage of Sensitive Information •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. • https://github.com/nextcloud/contacts/pull/2407 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j6cx-mxqf-f9vc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A missing file type check in Nextcloud Contacts 3.4.0 allows a malicious user to upload SVG files as PNG files to perform cross-site scripting (XSS) attacks. Una falta de comprobación del tipo de archivo en Nextcloud Contacts 3.4.0, permite a un usuario malicioso cargar archivos SVG como archivos PNG para llevar a cabo ataques de tipo cross-site scripting (XSS) • https://hackerone.com/reports/998422 https://nextcloud.com/security/advisory/?id=NC-SA-2020-044 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A missing file type check in Nextcloud Contacts 3.3.0 allows a malicious user to upload malicious SVG files to perform cross-site scripting (XSS) attacks. Una falta de comprobación de tipo de archivo en Nextcloud Contacts versión 3.3.0, permite a un usuario malicioso cargar archivos SVG maliciosos para llevar a cabo ataques de tipo cross-site scripting • https://hackerone.com/reports/894876 https://nextcloud.com/security/advisory/?id=NC-SA-2020-045 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •