Summary
This host is running ownCloud and is prone to cross-site scripting and file upload vulnerabilities.
Impact
Successful exploitation will allow remote attacker to execute arbitrary HTML or script code or discloses sensitive information resulting in loss of confidentiality.
Solution
Upgrade to ownCloud 4.5.2 or later,
For updates refer to http://owncloud.org
Insight
Multiple flaws are due to,
- An input passed via the filename to apps/files_versions/js/versions.js and apps/files/js/filelist.js and event title to
3rdparty/fullcalendar/js/fullcalendar.js is not properly sanitised before being returned to the user.
- Certain unspecified input passed to apps/user_webdavauth/settings.php is not properly sanitised before being returned to the user.
- An error due to the lib/migrate.php and lib/filesystem.php scripts are not properly verifying uploaded files.
Affected
ownCloud versions before 4.0.9 and 4.5.0, 4.5.x before 4.5.2
Detection
Send a crafted data via HTTP request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2012-5606, CVE-2012-5607, CVE-2012-5608, CVE-2012-5609, CVE-2012-5610 -
CVSS Base Score: 6.5
AV:N/AC:L/Au:S/C:P/I:P/A:P
Related Vulnerabilities
- APC PowerChute Network Shutdown HTTP Response Splitting Vulnerability
- Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
- AdaptCMS 'init.php' Remote File Include Vulnerability
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- Apache Tomcat TroubleShooter Servlet Installed