LWN.net Logo

owncloud: multiple vulnerabilities

Package(s):owncloud CVE #(s):CVE-2013-2045 CVE-2013-2046 CVE-2013-2039 CVE-2013-2085 CVE-2013-2040 CVE-2013-2041 CVE-2013-2042 CVE-2013-2044 CVE-2013-2047 CVE-2013-2043 CVE-2013-2048 CVE-2013-2089 CVE-2013-2086 CVE-2013-2049
Created:May 28, 2013 Updated:June 24, 2013
Description: From the Mageia advisory:

ownCloud before 5.0.6 does not neutralize special elements that are passed to the SQL query in lib/db.php which therefore allows an authenticated attacker to execute arbitrary SQL commands (CVE-2013-2045).

ownCloud before 5.0.6 and 4.5.11 does not neutralize special elements that are passed to the SQL query in lib/bookmarks.php which therefore allows an authenticated attacker to execute arbitrary SQL commands (CVE-2013-2046).

Multiple directory traversal vulnerabilities in (1) apps/files_trashbin/index.php via the "dir" GET parameter and (2) lib/files/view.php via undefined vectors in all ownCloud versions prior to 5.0.6 and other versions before 4.0.15, allow authenticated remote attackers to get access to arbitrary local files (CVE-2013-2039, CVE-2013-2085).

Cross-site scripting (XSS) vulnerabilities in multiple files inside the media application via multiple unspecified vectors in all ownCloud versions prior to 5.0.6 and other versions before 4.0.15 allows authenticated remote attackers to inject arbitrary web script or HTML (CVE-2013-2040).

Cross-site scripting (XSS) vulnerabilities in (1) apps/bookmarks/ajax/editBookmark.php via the "tag" GET parameter (CVE-2013-2041) and in (2) apps/files/js/files.js via the "dir" GET parameter to apps/files/ajax/newfile.php in ownCloud 5.0.x before 5.0.6 allows authenticated remote attackers to inject arbitrary web script or HTML (CVE-2013-2041).

Cross-site scripting (XSS) vulnerabilities in (1) apps/bookmarks/ajax/addBookmark.php via the "url" GET parameter and in (2) apps/bookmarks/ajax/editBookmark.php via the "url" POST parameter in ownCloud 5.0.x before 5.0.6 allows authenticated remote attackers to inject arbitrary web script or HTML (CVE-2013-2042).

Open redirect vulnerability in index.php (aka the Login Page) in ownCloud before 5.0.6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_url parameter (CVE-2013-2044).

Index.php (aka the login page) contains a form that does not disable the autocomplete setting for the password parameter, which makes it easier for local users or physically proximate attackers to obtain the password from web browsers that support autocomplete (CVE-2013-2047).

Due to not properly checking the ownership of an calendar, an authenticated attacker is able to download calendars of other users via the "calendar_id" GET parameter to /apps/calendar/ajax/events.php. Note: Successful exploitation of this privilege escalation requires the "calendar" app to be enabled (enabled by default) (CVE-2013-2043).

Due to an insufficient permission check, an authenticated attacker is able to execute API commands as administrator. Additionally, an unauthenticated attacker could abuse this flaw as a cross-site request forgery vulnerability (CVE-2013-2048).

Incomplete blacklist vulnerability in ownCloud before 5.0.6 allows authenticated remote attackers to execute arbitrary PHP code by uploading a crafted file and accessing an uploaded PHP file. Note: Successful exploitation requires that the /data/ directory is stored inside the webroot and a webserver that interprets .htaccess files (e.g. Apache) (CVE-2013-2089).

The configuration loader in ownCloud 5.0.x before 5.0.6 includes private data such as CSRF tokens in a JavaScript file, which allows remote attackers to obtain sensitive information (CVE-2013-2086).

Alerts:
Mageia MGASA-2013-0154 2013-05-25
Fedora FEDORA-2013-10440 2013-06-24

(Log in to post comments)

owncloud: multiple vulnerabilities

Posted May 31, 2013 7:39 UTC (Fri) by smurf (subscriber, #17840) [Link]

Yet another victim of the "PHP is insecure by default" class of bugs.

Why am I not surprised?

Why anybody would even start using PHP in a new project, these days, is completely beyond me.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds