{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-23942","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-01-19T21:12:31.362Z","datePublished":"2023-02-06T20:23:06.072Z","dateUpdated":"2025-03-10T21:15:57.175Z"},"containers":{"cna":{"title":"Self reflected HTML injection in Desktop client","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg","tags":["x_refsource_CONFIRM"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg"},{"name":"https://github.com/nextcloud/desktop/pull/5233","tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/desktop/pull/5233"},{"name":"https://hackerone.com/reports/1788598","tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/1788598"}],"affected":[{"vendor":"nextcloud","product":"security-advisories","versions":[{"version":"< 3.6.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-02-06T20:23:06.072Z"},"descriptions":[{"lang":"en","value":"The Nextcloud Desktop Client is a tool to synchronize files from a Nextcloud Server with your computer. Versions prior to 3.6.3 are missing sanitisation on qml labels which are used for basic HTML elements such as `strong`, `em` and `head` lines in the UI of the desktop client. The lack of sanitisation may allow for javascript injection. It is recommended that the Nextcloud Desktop Client is upgraded to 3.6.3. There are no known workarounds for this issue."}],"source":{"advisory":"GHSA-64qc-vf6v-8xgg","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:49:08.445Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg"},{"name":"https://github.com/nextcloud/desktop/pull/5233","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/desktop/pull/5233"},{"name":"https://hackerone.com/reports/1788598","tags":["x_refsource_MISC","x_transferred"],"url":"https://hackerone.com/reports/1788598"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-10T20:58:23.470933Z","id":"CVE-2023-23942","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-10T21:15:57.175Z"}}]}}