120 results (0.003 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Cross site request forgery in Kiteworks OwnCloud allows an unauthenticated attacker to forge requests. If a request has no Authorization header, it is created with an empty string as value by a rewrite rule. The CSRF check is done by comparing the header value to null, meaning that the existing CSRF check is bypassed in this case. An attacker can, for example, create a new administrator account if the request is executed in the browser of an authenticated victim. • https://cirosec.de/sa/sa-2023-012 https://hackerone.com/reports/2041007 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 16%CPEs: 1EXPL: 0

An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0. Se descubrió un problema en ownCloud owncloud/core antes de la versión 10.13.1. • https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls https://owncloud.org/security • CWE-287: Improper Authentication •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The Docker image of ownCloud Server through 10.11 contains a misconfiguration that renders the trusted_domains config useless. This could be abused to spoof the URL in password-reset e-mail messages. La imagen de Docker de ownCloud Server hasta 10.11 contiene una configuración incorrecta que inutiliza la configuración de Trusted_domains. Se podría abusar de esto para falsificar la URL en mensajes de correo electrónico de restablecimiento de contraseña. • https://owncloud.com •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

ownCloud owncloud/core before 10.10.0 Improperly Removes Sensitive Information Before Storage or Transfer. ownCloud owncloud/core antes de 10.10.0 elimina incorrectamente información confidencial antes de su almacenamiento o transferencia • https://cwe.mitre.org/data/definitions/212.html https://owncloud.com/security-advisories/cve-2022-31649 https://owncloud.org/security • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

Session fixation on password protected public links in the ownCloud Server before 10.8.0 allows an attacker to bypass the password protection when they can force a target client to use a controlled cookie. Una fijación de la sesión en enlaces públicos protegidos por contraseña en el servidor ownCloud versiones anteriores a 10.8.0, permite a un atacante omitir la protección por contraseña cuando puede forzar a un cliente objetivo a usar una cookie controlada • https://doc.owncloud.com/server/admin_manual/release_notes.html https://owncloud.com/security-advisories/cve-2021-35948 • CWE-384: Session Fixation •