Rocket.Chat before 3.11, 3.10.5, 3.9.7, 3.8.8 is vulnerable to persistent cross-site scripting (XSS) using nested markdown tags allowing a remote attacker to inject arbitrary JavaScript in a message. This flaw leads to arbitrary file read and RCE on Rocket.Chat desktop app.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://docs.rocket.chat/guides/security/security-updates | vendor advisory |
https://hackerone.com/reports/1014459 | third party advisory |
https://github.com/RocketChat/Rocket.Chat/pull/20430 | third party advisory patch |