Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-49103 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | Vulnerability #1 is being exploited in the wild. |
Vulnerable software Subscribe |
Graph API Universal components / Libraries / Programming Languages & Components |
Vendor | ownCloud |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU83566
Risk: High
CVSSv3.1: 8.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:H/RL:O/RC:C]
CVE-ID: CVE-2023-49103
CWE-ID:
CWE-200 - Information exposure
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the application relies on the third-party GetPhpInfo.php library that provides a URL when it is accessed and reveals the configuration details of the PHP environment (phpinfo). The disclosed information includes all the environment variables of the webserver. In
containerized deployments, these environment variables may include
sensitive data such as the ownCloud admin password, mail server
credentials, and license key. A remote non-authenticated attacker can gain access to sensitive information.
Install updates from vendor's website.
Vulnerable software versionsGraph API: 0.2.0 - 0.3.0
External linkshttp://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
http://www.greynoise.io/blog/cve-2023-49103-owncloud-critical-vulnerability-quickly-exploited-in-the-wild
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.