OwnCloud 10.6.x < 10.13.1 WebDav Authentication Bypass

critical Web App Scanning Plugin ID 114118

Synopsis

OwnCloud 10.6.x < 10.13.1 WebDav Authentication Bypass

Description

An Authentication Bypass was discovered in OwnCloud 10.6.x prior to 10.13.1 in the WebDAV protocol. An unauthenticated attacker can access, modify or delete any file if a victim's username is known and the victim has no signing key configured because pre-signed URLs can be accepted even if no signing key is configured for the file owner (default case).

Solution

Upgrade to OwnCloud version 10.13.1 or later.

See Also

https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/

https://www.ambionics.io/blog/owncloud-cve-2023-49103-cve-2023-49105

Plugin Details

Severity: Critical

ID: 114118

Type: remote

Published: 12/6/2023

Updated: 12/6/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-49105

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2023-49105

Vulnerability Information

CPE: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/5/2023

Vulnerability Publication Date: 11/21/2023

Reference Information

CVE: CVE-2023-49105