CVE-2021-39222

Source
https://cve.org/CVERecord?id=CVE-2021-39222
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39222.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-39222
Related
  • GHSA-xhxq-f4vg-jw5g
Published
2021-11-15T19:15:07.297Z
Modified
2026-01-10T03:59:08.158851Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.

References

Affected packages

Git / github.com/nextcloud/spreed

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/spreed
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.21
v1.0.22
v1.1
v1.1.2
v1.2

v10.*

v10.0.0
v10.0.0-beta.1
v10.0.0-beta.2
v10.0.0-rc.1
v10.0.0-rc.2
v10.0.1
v10.0.2
v10.0.3
v10.0.4
v10.0.5
v10.0.6

v2.*

v2.0.0
v2.9.0
v2.9.1

v3.*

v3.0.0
v3.0.1
v3.99.10
v3.99.11
v3.99.12
v3.99.8

v4.*

v4.0.0
v4.99.5

v5.*

v5.99.10

v6.*

v6.0.0-rc.1
v6.0.0-rc.2

v7.*

v7.0.0-beta.1

v8.*

v8.0.0
v8.0.0-alpha.1
v8.0.0-alpha.2
v8.0.0-alpha.3
v8.0.0-alpha.4
v8.0.0-alpha.5
v8.0.0-alpha.6

v9.*

v9.0.0-beta.1

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39222.json"

Git / github.com/nextcloud/talk-android

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/talk-android
Events

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39222.json"