Calendar export: Authorization Bypass Through User-Controlled Key
Platform: ownCloud Server
Versions: 7.0.8, 8.0.6, 8.1.1,
Risk level: Low
CVSS v2 Base Score: 4 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Due to not properly checking the ownership of an calendar, an authenticated attacker is able to download calendars of other users via the “calid” GET parameter to export.php in /apps/calendar/
- ownCloud Server < 8.1.1 (CVE-2015-6670)
- ownCloud Server < 8.0.6 (CVE-2015-6670)
- ownCloud Server < 7.0.8 (CVE-2015-6670)
The vulnerable component has been fixed.
The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:
- Ralf Vroomen – Vulnerability discovery and disclosure.