Summary
This host is installed with ownCloud and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to rename arbitrary files, gain access to arbitrary contacts of other users, perform a Cross-Site Request Forgery attack, enumerate shared files of other users and execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
Impact Level: Application
Solution
Upgrade to ownCloud version 6.0.3 or later,
For updates refer to http://owncloud.org
Insight
Multiple flaws are due to,
- Input passed to 'print_unescaped' function in the Documents component is not validated before returning it to users.
- Server fails to verify permissions for users that attempt to rename files of other users.
- HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions.
- Program uses the auto-incrementing file_id instead of randomly generated token.
Affected
ownCloud Server 6.0.x before 6.0.3
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-3832, CVE-2014-3834, CVE-2014-3836, CVE-2014-3837 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities