Bug 1296589 (CVE-2016-1499) - CVE-2016-1499 owncloud: information disclosure via directory listings
Summary: CVE-2016-1499 owncloud: information disclosure via directory listings
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2016-1499
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1295471 1296590 1296591
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-01-07 15:42 UTC by Adam Mariš
Modified: 2019-09-29 13:41 UTC (History)
4 users (show)

Fixed In Version: owncloud 8.0.10, owncloud 8.1.5, owncloud 8.2.2
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-04-25 06:44:08 UTC


Attachments (Terms of Use)

Description Adam Mariš 2016-01-07 15:42:33 UTC
It was found that ownCloud is vulnerable to information exposure through directory listing. It is possible with a normal user to get information about the complete directory structure and included files of all users. The 'force' parameter in the script (index.php/apps/files/ajax/scan.php) can easily be manipulated, by setting its value to 'true'. This vulnerability can potentially be used for denial-of-service attacks if the selected directory is deep enough, because to index many directories requires high computational effort. In addition, sensitive information from other users is exposed.

Reproducer can be found here:

http://seclists.org/bugtraq/2016/Jan/15

Comment 1 Adam Mariš 2016-01-07 15:43:07 UTC
Created owncloud tracking bugs for this issue:

Affects: fedora-all [bug 1296590]
Affects: epel-all [bug 1296591]

Comment 2 James Hogarth 2016-04-25 06:44:08 UTC
Versions that fix this have been pushed to all supported distributions.


Note You need to log in before you can comment on or make changes to this bug.