Summary
This host is installed with ownCloud and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to mount an external storage without permission, access the file names of other users and execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
Impact Level: Application
Solution
Upgrade to ownCloud version 5.0.16 or 6.0.3 or later, For updates refer to http://owncloud.org
Insight
Multiple flaws are due to,
- Input passed on to 'print_unescaped' function in the Gallery component is not sufficiently validated before returning it to users.
- The program fails to verify whether a user has been granted access to add external storages or not.
- The server fails to properly perform authorization checks in core when handling user accounts.
Affected
ownCloud Server 5.0.x before 5.0.16 and 6.0.x before 6.0.3
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-3833, CVE-2014-3835, CVE-2014-3838 -
CVSS Base Score: 5.5
AV:N/AC:L/Au:S/C:N/I:P/A:P
Related Vulnerabilities
- Apache Archiva Home Page Cross-Site Scripting vulnerability
- Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
- Adobe ColdFusion Multiple Path Disclosure Vulnerabilities
- Apache Struts2 showcase namespace XSS Vulnerability
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities