ownCloud Multiple Vulnerabilities - 01 May14

Summary
This host is installed with ownCloud and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary PHP code, gain access to arbitrary local files, execute API commands as administrator, conduct cross-site request forgery attacks, gain access to a user's account or password, redirect users to arbitrary web sites and conduct phishing attacks, obtain sensitive information and execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. Impact Level: System/Application
Solution
Upgrade to ownCloud version 5.0.6 or later, For updates refer to http://owncloud.org
Insight
Multiple flaws are due to, - Insufficient validation of user-supplied input passed via 'tag' GET parameter to templates/js_tpl.php script, the 'dir' GET parameter to apps/files/ajax/newfile.php script, the 'redirect_url' parameter to the index.php script. - An error in configuration loader which includes private data such as CSRF tokens in a JavaScript file. - An error in the index.php script due to the autocomplete setting being enabled for the 'password' parameter. - An insufficient permission check for sensitive transactions. - Insufficient sanitization of user-supplied input via the 'dir' GET parameter to apps/files_trashbin/index.php script. - Insufficient verification of user-supplied files for uploading.
Affected
ownCloud Server 5.0.x before version 5.0.6
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References