Skip to main content

ownCloud releases Security Advisories

The security advisories address three critical vulnerabilities with one being reported as exploited in the wild

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

The security advisories address three critical vulnerabilities with one being reported as exploited in the wild


Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

ownCloud have released security advisories to address three critical vulnerabilities

  • CVE-2023-49103 has a CVSSv3 score of 10.0 and could allow an unauthenticated, remote attacker to access sensitive information including ownCloud admin passwords, mail server credentials, and license keys. 
  • CVE-2023-49105 has a CVSSv3 score of 8.7 and is a validation bypass vulnerability that could allow an attacker to redirect callbacks to a Top Level Domain controller by the attacker.
  • CVE-2023-49104 has a CVSSv3 score of 9.8 and is an authentication bypass vulnerability that could allow an unauthenticated attacker to access, modify or delete any file if the username of the victim is known and the victim has no signing-key configured (which is the default).

Exploitation in the wild of CVE-2023-49103

Following public disclosure of a proof of concept, there have been exploitation attempts in the wild observed for CVE-2023-49103. 


Remediation advice

Affected organisations are encouraged to review the ownCloud Security Advisories and apply the relevant mitigations.


Remediation steps

Type Step
Guidance

Delete the 'owncloud/apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php' file, disable the 'phpinfo' function in Docker containers, and change potentially exposed secrets like the ownCloud admin password, mail server, database credentials, and Object-Store/S3 access keys.


https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/
Guidance

Deny the use of pre-signed urls if no signing-key is configured for the owner of the files.


https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/
Guidance

Harden the validation code in the oauth2 app. As a workaround you can disable the “Allow Subdomains” option to disable the vulnerability.


https://owncloud.com/security-advisories/subdomain-validation-bypass/

Definitive source of threat updates


CVE Vulnerabilities

Last edited: 28 November 2023 1:59 pm