Information Exposure Through Directory Listing in the file scanner
Platform: ownCloud Server
Versions: 8.0.6, 8.1.1,
Risk level: Low
CVSS v2 Base Score: 4 (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Due to an incorrect usage of an ownCloud internal file system function the passed path to the file scanner was resolved relatively. An authenticated adversary may thus be able to get a listing of directories (but not the containing files) existing on the filesystem. However, it is not possible to access any of these files.
For a more technical description please take a look at the advisory of the reporter.
- ownCloud Server < 8.1.1 (CVE-2015-6500)
- ownCloud Server < 8.0.6 (CVE-2015-6500)
The vulnerable component has been patched and will be replaced by a cron job in a future ownCloud release
The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:
- Martin Macht – SySS GmbH – Vulnerability discovery and disclosure.