Content-Spoofing in “files” app
Platform: ownCloud Server
Versions: 9.0.6, 9.1.2,
Risk level: Low
CVSS v3 Base Score: 3.1 (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)
HackerOne report: 154827
The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
- ownCloud Server < 9.1.2 (CVE-2016-????)
- ownCloud Server < 9.0.6 (CVE-2016-????)
The passed parameter is now verified.
The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory: