#VU83566 Information disclosure in Graph API


Published: 2023-12-05 | Updated: 2024-04-05

Vulnerability identifier: #VU83566

Vulnerability risk: High

CVSSv3.1: 8.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:H/RL:O/RC:C]

CVE-ID: CVE-2023-49103

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Graph API
Universal components / Libraries / Programming Languages & Components

Vendor: ownCloud

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the application relies on the third-party GetPhpInfo.php library that provides a URL when it is accessed and reveals the configuration details of the PHP environment (phpinfo). The disclosed information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. A remote non-authenticated attacker can gain access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Graph API: 0.2.0 - 0.3.0


External links
http://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
http://www.greynoise.io/blog/cve-2023-49103-owncloud-critical-vulnerability-quickly-exploited-in-the-wild


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability