Information disclosure in ownCloud graphapi app



Published: 2023-11-29 | Updated: 2024-04-05
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-49103
CWE-ID CWE-200
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
Subscribe
Graph API
Universal components / Libraries / Programming Languages & Components

Vendor ownCloud

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU83566

Risk: High

CVSSv3.1: 8.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:H/RL:O/RC:C]

CVE-ID: CVE-2023-49103

CWE-ID: CWE-200 - Information exposure

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the application relies on the third-party GetPhpInfo.php library that provides a URL when it is accessed and reveals the configuration details of the PHP environment (phpinfo). The disclosed information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. A remote non-authenticated attacker can gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Graph API: 0.2.0 - 0.3.0

External links

http://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
http://www.greynoise.io/blog/cve-2023-49103-owncloud-critical-vulnerability-quickly-exploited-in-the-wild


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###