Impact
A stored XSS vulnerability was found in Collabora Online. An attacker could create a document with an XSS payload as a document name. Later, if an administrator opens the admin console and navigates to the history page the document name is injected as unescaped HTML and executed as a script inside the context of the admin console. The administrator JWT used for the websocket connection can be leaked through this flaw.
Patches
Users should upgrade to Collabora Online 22.05.13 or higher; Collabora Online 21.11.9.1 or higher; Collabora Online 6.4.27 or higher.
Credits
Thanks to René de Sain (@renniepak) for reporting this flaw.
For more information
If you have any questions or comments about this advisory:
Impact
A stored XSS vulnerability was found in Collabora Online. An attacker could create a document with an XSS payload as a document name. Later, if an administrator opens the admin console and navigates to the history page the document name is injected as unescaped HTML and executed as a script inside the context of the admin console. The administrator JWT used for the websocket connection can be leaked through this flaw.
Patches
Users should upgrade to Collabora Online 22.05.13 or higher; Collabora Online 21.11.9.1 or higher; Collabora Online 6.4.27 or higher.
Credits
Thanks to René de Sain (@renniepak) for reporting this flaw.
For more information
If you have any questions or comments about this advisory: