Information Exposure Through Directory Listing in the file scanner
Platform: ownCloud Server
Versions: 8.0.10, 8.1.5, 8.2.2,
Risk level: Medium
CVSS v2 Base Score: 4 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Due to an incorrect usage of an ownCloud internal file system function the passed path to the file scanner was resolved relatively. An authenticated adversary may thus be able to get a listing of files existing on the filesystem. However, it is not possible to access any of these files.
This causes a massive server load and thus an enumeration of the whole server content is unlikely due to the high risk of Denial of Service.
For a more technical description please take a look at the advisory of the reporter.
- ownCloud Server < 8.2.2 (CVE-2016-1499)
- ownCloud Server < 8.1.5 (CVE-2016-1499)
- ownCloud Server < 8.0.10 (CVE-2016-1499)
The vulnerable vulnerable component has been patched and will be replaced by a cronjob in ownCloud 9.0.
The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:
- Dr. Erlijn van Genuchten – SySS GmbH – Vulnerability discovery and disclosure.