CVE-2021-29438
JavaScript vulnerability analysis and mitigation

Overview

The Nextcloud dialogs library (npm package @nextcloud/dialogs) before version 3.1.2 contained a cross-site scripting (XSS) vulnerability. The vulnerability was discovered and disclosed on April 13, 2021, and was assigned CVE-2021-29438. The issue affected the toast functionality of the library, where text input was insufficiently escaped when passed to a toast notification (GitHub Advisory, NVD).

Technical details

The vulnerability stemmed from insufficient escaping of text input that was passed to the toast notification function. When applications displayed toasts with user-supplied input, this could lead to cross-site scripting attacks. The vulnerability was rated with a CVSS v3.1 Base Score of 5.4 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. It's worth noting that Nextcloud Server employs a strict Content Security Policy that helps mitigate the risk of these XSS vulnerabilities (NVD).

Impact

If exploited, this vulnerability could allow attackers to execute arbitrary web scripts in the context of the affected application when user-supplied input is displayed in toast notifications. However, the impact was somewhat limited by Nextcloud Server's Content Security Policy, which provides an additional layer of protection against XSS attacks (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 3.1.2 of the @nextcloud/dialogs package. For users who need to display HTML in toast notifications, they should explicitly pass the options.isHTML config flag. As a workaround for those unable to upgrade, it's recommended to ensure that no user-supplied input flows into toasts (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management