Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | N/A |
CWE-ID | CWE-269 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
ownCloud Server Web applications / Modules and components for CMS |
Vendor | ownCloud |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU19532
Risk: Medium
CVSSv3.1:
CVE-ID: N/A
CWE-ID:
Exploit availability:
Description
The vulnerability allows a remote attacker to gain elevated privileges.
The vulnerability exists due to the possibility to extend internal-share permissions using the API. A remote attacker can extend the permission of a received subfolder share using the ocs api and gain elevated privileges. Additional risk exists because the privileged extension is also possible on public-shares.
MitigationInstall updates from vendor's website.
Vulnerable software versionsownCloud Server: 1.0 - 10.2.0
Fixed software versionsCPE2.3 External links
http://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api/
http://github.com/owncloud/core/commit/c93eca49c32428ece03dd67042772d5fa62c8d6e
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU19544
Risk: Medium
CVSSv3.1:
CVE-ID: N/A
CWE-ID:
Exploit availability:
Description
The vulnerability allows a remote attacker to gain elevated privileges.
The vulnerability exists due to the possibility to extend internal-share permissions using the API. A remote authenticated attacker can extend the permission of a received internal-share using the ocs-api and gain elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsownCloud Server: 1.0 - 10.2.0
Fixed software versionsCPE2.3 External links
http://owncloud.org/security/advisories/possibility-to-extend-internal-share-permissions-using-the-api2/
http://github.com/owncloud/core/commit/4ae39f7c70bb26e55d7396184da5c30dd75980a3
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?