ownCloud server 9.1.3User enumeration with error messages
Information disclosure in email field dialog at sharing
Flooding logfiles with a 1 Bit BMP File
ownCloud desktop 2.2.3Local Code Injection
ownCloud mobile iOS 3.4.4Improper validation of certificates within the iOS application
Credentials potentially leaked to other configured ownCloud instance
Timing attack on the password reset (oC-SA-2012-002)
24th August 2012
Risk level: Medium
The "Lost Password" implementation is vulnerable to a Remote Timing Attack. The token used to secure the password reset is fetched from the database and compared to the user-specified value using the equals operator. An attacker successfully rebuilding the token can then specify an arbitrary password in POST which will overwrite the old password.
Please note that actual exploitation would require an attacker to be on the same LAN as the ownCloud server.
- ownCloud Server < 4.5.1 (CVE-2012-5607)
- ownCloud Server < 4.0.9 (CVE-2012-5607)
It is recommended that all instances are upgraded to ownCloud Server 4.5.1 or 4.0.10.
The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:
- Andreas Fischer - ownCloud Inc. (firstname.lastname@example.org) - Vulnerability discovery and disclosure.