ownCloud releases Security Advisories
The security advisories address three critical vulnerabilities with one being reported as exploited in the wild
Summary
The security advisories address three critical vulnerabilities with one being reported as exploited in the wild
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
ownCloud have released security advisories to address three critical vulnerabilities.
- CVE-2023-49103 has a CVSSv3 score of 10.0 and could allow an unauthenticated, remote attacker to access sensitive information including ownCloud admin passwords, mail server credentials, and license keys.
- CVE-2023-49105 has a CVSSv3 score of 8.7 and is a validation bypass vulnerability that could allow an attacker to redirect callbacks to a Top Level Domain controller by the attacker.
- CVE-2023-49104 has a CVSSv3 score of 9.8 and is an authentication bypass vulnerability that could allow an unauthenticated attacker to access, modify or delete any file if the username of the victim is known and the victim has no signing-key configured (which is the default).
Exploitation in the wild of CVE-2023-49103
Following public disclosure of a proof of concept, there have been exploitation attempts in the wild observed for CVE-2023-49103.
Remediation advice
Affected organisations are encouraged to review the ownCloud Security Advisories and apply the relevant mitigations.
Remediation steps
| Type | Step |
|---|---|
| Guidance |
Delete the 'owncloud/apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php' file, disable the 'phpinfo' function in Docker containers, and change potentially exposed secrets like the ownCloud admin password, mail server, database credentials, and Object-Store/S3 access keys. https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ |
| Guidance |
Deny the use of pre-signed urls if no signing-key is configured for the owner of the files. https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/ |
| Guidance |
Harden the validation code in the oauth2 app. As a workaround you can disable the “Allow Subdomains” option to disable the vulnerability. https://owncloud.com/security-advisories/subdomain-validation-bypass/ |
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 28 November 2023 1:59 pm