Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 412899 (CVE-2012-2269) - <www-apps/owncloud-3.0.3 : multiple vulnerabilities (CVE-2012-{2269,2270,2397,2398})
Summary: <www-apps/owncloud-3.0.3 : multiple vulnerabilities (CVE-2012-{2269,2270,2397...
Status: RESOLVED FIXED
Alias: CVE-2012-2269
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/48850/
Whiteboard: ~4 [noglsa]
Keywords:
: 413817 (view as bug list)
Depends on:
Blocks:
 
Reported: 2012-04-21 09:54 UTC by Agostino Sarubbo
Modified: 2012-05-11 11:16 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-04-21 09:54:22 UTC
From secunia:

Description
A weakness and multiple vulnerabilities have been discovered in ownCloud, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct spoofing, cross-site scripting, and cross-site request forgery attacks.

1) Input passed via the "redirect_url" parameter to index.php is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

2) Input passed via the "redirect_url" parameter to index.php and the "files" parameter to files/ajax/download.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

3) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. conduct script insertion attacks via editing contacts when a logged-in user visits a specially crafted web page.

4) An error due to the files/ajax/upload.php script not verifying the extension of an uploaded file can be exploited to e.g. upload an .htaccess file, which will allow uploaded PHP files to be executed.

The weakness and vulnerabilities are confirmed in version 3.0.2. Other versions may also be affected.


Solution
Vulnerability #4 is fixed in the GIT repository. Edit the source code to ensure that input is properly sanitised and verified. Do not browse untrusted sites or follow untrusted links while being logged-in to the application.
Comment 1 Sean Amoss (RETIRED) gentoo-dev Security 2012-04-28 11:07:51 UTC
*** Bug 413817 has been marked as a duplicate of this bug. ***
Comment 2 Bernard Cafarelli gentoo-dev 2012-05-11 09:18:24 UTC
Changelog is a bit short on security fixes:
http://owncloud.org/releases/Changelog

but 3.0.3 should fix all current security issues:
https://twitter.com/#!/ownCloudcom/status/197717309287182336

It is in tree now, and I removed older 3.0.2 version
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2012-05-11 11:16:55 UTC
Thanks, Bernard.

Closing noglsa for ~arch only package.