< go back to overview

Information Exposure Through Directory Listing in the file scanner

Platform: ownCloud Server

Versions: 8.0.10, 8.1.5, 8.2.2,

Date: 1/6/2016

Risk level: Medium

CVSS v2 Base Score: 4 (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CWE: Information Exposure Through Directory Listing (CWE-548)


Due to an incorrect usage of an ownCloud internal file system function the passed path to the file scanner was resolved relatively. An authenticated adversary may thus be able to get a listing of files existing on the filesystem. However, it is not possible to access any of these files.

This causes a massive server load and thus an enumeration of the whole server content is unlikely due to the high risk of Denial of Service.

For a more technical description please take a look at the advisory of the reporter.

Affected Software

Action Taken

The vulnerable vulnerable component has been patched and will be replaced by a cronjob in ownCloud 9.0.


The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:

  • Dr. Erlijn van Genuchten – SySS GmbH – Vulnerability discovery and disclosure.

Share this

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.