Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 412899 (CVE-2012-2269)

Summary: <www-apps/owncloud-3.0.3 : multiple vulnerabilities (CVE-2012-{2269,2270,2397,2398})
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: alexxy, glsamaker, panard, voyageur, web-apps
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://secunia.com/advisories/48850/
Whiteboard: ~4 [noglsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2012-04-21 09:54:22 UTC
From secunia:

Description
A weakness and multiple vulnerabilities have been discovered in ownCloud, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct spoofing, cross-site scripting, and cross-site request forgery attacks.

1) Input passed via the "redirect_url" parameter to index.php is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

2) Input passed via the "redirect_url" parameter to index.php and the "files" parameter to files/ajax/download.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

3) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. conduct script insertion attacks via editing contacts when a logged-in user visits a specially crafted web page.

4) An error due to the files/ajax/upload.php script not verifying the extension of an uploaded file can be exploited to e.g. upload an .htaccess file, which will allow uploaded PHP files to be executed.

The weakness and vulnerabilities are confirmed in version 3.0.2. Other versions may also be affected.


Solution
Vulnerability #4 is fixed in the GIT repository. Edit the source code to ensure that input is properly sanitised and verified. Do not browse untrusted sites or follow untrusted links while being logged-in to the application.
Comment 1 Sean Amoss (RETIRED) gentoo-dev Security 2012-04-28 11:07:51 UTC
*** Bug 413817 has been marked as a duplicate of this bug. ***
Comment 2 Bernard Cafarelli gentoo-dev 2012-05-11 09:18:24 UTC
Changelog is a bit short on security fixes:
http://owncloud.org/releases/Changelog

but 3.0.3 should fix all current security issues:
https://twitter.com/#!/ownCloudcom/status/197717309287182336

It is in tree now, and I removed older 3.0.2 version
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2012-05-11 11:16:55 UTC
Thanks, Bernard.

Closing noglsa for ~arch only package.