Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
References
Link | Resource |
---|---|
https://owncloud.org/security/advisory/?id=oc-sa-2016-013 | Patch Vendor Advisory |
https://nextcloud.com/security/advisory/?id=nc-sa-2016-003 | Patch Vendor Advisory |
https://hackerone.com/reports/145463 | Exploit Third Party Advisory |
https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf | Issue Tracking Patch Third Party Advisory |
https://github.com/nextcloud/server/commit/dea8e29289a1b99d5e889627c2e377887f4f2983 | Issue Tracking Patch Third Party Advisory |
https://github.com/nextcloud/server/commit/8aa0832bd449c44ec300da4189bd8ed4e036140c | Issue Tracking Patch Third Party Advisory |
https://github.com/nextcloud/server/commit/2da43e3751576bbc838f238a09955c4dcdebee8e | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/97282 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-03-27 19:59
Updated : 2017-04-03 18:59
NVD link : CVE-2016-9460
Mitre link : CVE-2016-9460
JSON object : View
CWE
CWE-284
Improper Access Control
Products Affected
owncloud
- owncloud
nextcloud
- nextcloud