ID CVE-2016-7102 Type cve Reporter cve@mitre.org Modified 2017-02-02T02:59:00
Description
ownCloud Desktop before 2.2.3 allows local users to execute arbitrary code and possibly gain privileges via a Trojan library in a "special path" in the C: drive.
{"owncloud": [{"lastseen": "2017-04-18T17:18:16", "bulletinFamily": "software", "cvelist": ["CVE-2016-7102"], "edition": 4, "description": "The ownCloud Client was vunerable to a local code injection attack. A malicious local user could create a special path where the client would load libraries from during startup. As on Windows, everyone by default has the permission to write to the `C:` drive and create arbitrary directories and subdirectories, this attack is practically feasible in any non-hardened Windows environment. This could lead to injecting code into other users' ownCloud Client.\n\n \n\n\n* * *\n\n**[For more information please consult the official advisory.](<https://owncloud.org/security/advisory/?id=oC-SA-2016-016>)**\n\n\nThis advisory is licensed [CC BY-SA 4.0](https://creativecommons.org/licenses/by-sa/4.0/)", "modified": "2016-08-17T17:37:31", "published": "2016-08-17T17:37:31", "id": "OC-SA-2016-016", "href": "https://owncloud.org/security/advisory/?id=oC-SA-2016-016", "type": "owncloud", "title": "Desktop Client: Local Code Injection", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-11T22:53:29", "bulletinFamily": "software", "cvelist": ["CVE-2016-7102"], "description": "The ownCloud Client was vunerable to a local code injection attack. A malicious local user could create a special path where the client would load libraries from during startup. As on Windows, everyone by default has the permission to write to the `C:` drive and create arbitrary directories and subdirectories, this attack is practically feasible in any non-hardened Windows environment. This could lead to injecting code into other users' ownCloud Client.\n\n### Affected Software\n\n * ownCloud Desktop < **2.2.3** (CVE-2016-7102)\n\n### Action Taken\n\nTo protect our users ownCloud has issued the 2.2.3 client which no longer loads code from this location.\n\n### Acknowledgements\n\nThe ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:\n\n * Florian Bogner - Vulnerability discovery and disclosure.\n", "edition": 1, "modified": "2017-12-13T13:06:51", "published": "2016-08-17T11:43:23", "href": "https://owncloud.org/security/advisories/local-code-injection/", "id": "OWNCLOUD:B547D2D533D60DB2EB9BE3EFA66A2D2E", "type": "owncloud", "title": "Local Code Injection - ownCloud", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}