< go back to overview

Stored XSS in CardDAV image export

Platform: ownCloud Server

Versions: 9.0.6, 9.1.2,

Date: 11/10/2016

Risk level: Medium

CVSS v3 Base Score: 5.4 (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

CWE: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) (CWE-79)

HackerOne report: 163338


The CardDAV image export functionality as implemented in ownCloud allows the download of images stored within a vCard. Due to not performing any kind of verification on the image content this is prone to a stored Cross-Site Scripting attack.

Note:ownCloud employs a very strict Content Security Policy on the DAV endpoints. This is thus only exploitable on browsers that don’t support Content Security Policy.

Affected Software

Action Taken

The mimetype of the exported image is now compared with a whitelist as well as download disposition headers have been set on the response.


The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:

This advisory is licensed CC BY-SA 4.0. Original source: nextcloud.com

Share this

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.