[nextcloud.com] Control character allowed in Submit Question
Medium
N
Nextcloud
Submitted None
Actions:
Reported by
lmhu
Vulnerability Details
Technical details and impact analysis
**Issue descriptions**
We found that the maximum length of the first and last name fields was not set to 32 characters at registration and to 1000 characters when using the profile update form. The attacker can use this method as a malware attack, the user will redirect to a website that contains malware or hijack.
**URL Effected**
https://nextcloud.com/contact/
### Steps To Reproduce:
* Open directory url https://nextcloud.com/contact/
* Repreat url to burp suite
* Chage a subject ``Organization-name`` your payloads.txt
* "Subject Name" has been effected a Control character allowed vulnerable but you can use this for hijacking emails
* Paste a victim emails to sent a malware attack
* Sent request to victim emails, and boom this emails has been hijact.
**Proof On Concept**
```
POST /api/t/1/credit/share HTTP/1.1
Host: nextcloud.com
Connection: close
Upgrade-Insecure-Requests: 1
yourname=%24%21%25%24%5E%21%25%24%5E%25%21*%24%25%21*%5E%24%25*%26%21%25%24*%26%5E%21%26*%5E%24%26*%21%5E%26*%24%21%25%24%5E%21%25%24%5E%25%21*%24%25%21*%5E%24%25*%26%21&email=kittytrace%40wearehackerone.com&organization=Hello+your+account+has+been+hacked+please+visit+here+https%3A%2F%2Fevil.com%2F&role=Administrator&phone=Test&comments=TEST&gdprcheck=gdprchecked&captcha=10&checksum=a29a82e78e%3A478e965f1f8045a0beac0c1ba3424f10ca25f859543909747b89c33eec6df943
```
### Screenshots POC
F1163343
F1163344
## Impact
Attacker can sent a malware attack to victim email using a server notification emails this is can leads to Business Logic Errors
* Email Hijacking
* Control character allowed in username
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Access Control - Generic