Bug 1296589 (CVE-2016-1499)

Summary: CVE-2016-1499 owncloud: information disclosure via directory listings
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: awilliam, ignatenko, james.hogarth, shawn
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: owncloud 8.0.10, owncloud 8.1.5, owncloud 8.2.2 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-04-25 06:44:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1295471, 1296590, 1296591    
Bug Blocks:    

Description Adam Mariš 2016-01-07 15:42:33 UTC
It was found that ownCloud is vulnerable to information exposure through directory listing. It is possible with a normal user to get information about the complete directory structure and included files of all users. The 'force' parameter in the script (index.php/apps/files/ajax/scan.php) can easily be manipulated, by setting its value to 'true'. This vulnerability can potentially be used for denial-of-service attacks if the selected directory is deep enough, because to index many directories requires high computational effort. In addition, sensitive information from other users is exposed.

Reproducer can be found here:

http://seclists.org/bugtraq/2016/Jan/15

Comment 1 Adam Mariš 2016-01-07 15:43:07 UTC
Created owncloud tracking bugs for this issue:

Affects: fedora-all [bug 1296590]
Affects: epel-all [bug 1296591]

Comment 2 James Hogarth 2016-04-25 06:44:08 UTC
Versions that fix this have been pushed to all supported distributions.