Description
Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.
References
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92
https://github.com/nextcloud/spreed/pull/6239
https://hackerone.com/reports/1337178
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2022-03-08T18:15:07.737
3 years agoLast modified
2022-03-15T16:18:40.120
3 years ago