mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
101 lines
3.5 KiB
JSON
101 lines
3.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2021-32707",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Bypass of image blocking in Nextcloud Mail"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "security-advisories",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "< 1.9.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "nextcloud"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Nextcloud Mail is a mail app for Nextcloud. In versions prior to 1.9.6, the Nextcloud Mail application does not, by default, render images in emails to not leak the read state. The privacy filter failed to filter images with a `background-image` CSS attribute. Note that the images were still passed through the Nextcloud image proxy, and thus there was no IP leakage. The issue was patched in version 1.9.6 and 1.10.0. No workarounds are known to exist."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-20: Improper Input Validation"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xxp4-44xc-8crh"
|
|
},
|
|
{
|
|
"name": "https://github.com/nextcloud/mail/pull/5189",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/mail/pull/5189"
|
|
},
|
|
{
|
|
"name": "https://hackerone.com/reports/1215251",
|
|
"refsource": "MISC",
|
|
"url": "https://hackerone.com/reports/1215251"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-xxp4-44xc-8crh",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |