Bug 1296589 - (CVE-2016-1499) CVE-2016-1499 owncloud: information disclosure via directory listings
CVE-2016-1499 owncloud: information disclosure via directory listings
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1295471 1296590 1296591
  Show dependency treegraph
Reported: 2016-01-07 10:42 EST by Adam Mariš
Modified: 2016-04-25 02:44 EDT (History)
4 users (show)

See Also:
Fixed In Version: owncloud 8.0.10, owncloud 8.1.5, owncloud 8.2.2
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2016-04-25 02:44:08 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-01-07 10:42:33 EST
It was found that ownCloud is vulnerable to information exposure through directory listing. It is possible with a normal user to get information about the complete directory structure and included files of all users. The 'force' parameter in the script (index.php/apps/files/ajax/scan.php) can easily be manipulated, by setting its value to 'true'. This vulnerability can potentially be used for denial-of-service attacks if the selected directory is deep enough, because to index many directories requires high computational effort. In addition, sensitive information from other users is exposed.

Reproducer can be found here:

Comment 1 Adam Mariš 2016-01-07 10:43:07 EST
Created owncloud tracking bugs for this issue:

Affects: fedora-all [bug 1296590]
Affects: epel-all [bug 1296591]
Comment 2 James Hogarth 2016-04-25 02:44:08 EDT
Versions that fix this have been pushed to all supported distributions.

Note You need to log in before you can comment on or make changes to this bug.