CVE-2021-32733

Name
CVE-2021-32733
Description
Nextcloud Text is a collaborative document editing application that uses Markdown. A cross-site scripting vulnerability is present in versions prior to 19.0.13, 20.0.11, and 21.0.3. The Nextcloud Text application shipped with Nextcloud server used a `text/html` Content-Type when serving files to users. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, use a browser that has support for Content-Security-Policy.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://hackerone.com/reports/1241460
MISC https://github.com/nextcloud/text/pull/1689
CONFIRM https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:* nextcloud_server >= None < 19.0.13
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:* nextcloud_server >= 20.0.0 < 20.0.11
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:* nextcloud_server >= 21.0.0 < 21.0.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status