Description
Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.
References
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92
https://github.com/nextcloud/spreed/pull/6239
https://hackerone.com/reports/1337178
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92
https://github.com/nextcloud/spreed/pull/6239
https://hackerone.com/reports/1337178
CVSS impact metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
4.7 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-08T17:15:07.737Z
3 years agoLast modified
2024-11-21T05:25:41.370Z
1 year ago