Lucene search

K
openvasCopyright (C) 2021 Greenbone AGOPENVAS:1361412562310146730
HistorySep 21, 2021 - 12:00 a.m.

ownCloud < 4.0.7 Multiple Vulnerabilities (oC-SA-2012-012, oC-SA-2012-013, oC-SA-2012-014, oC-SA-2012-015)

2021-09-2100:00:00
Copyright (C) 2021 Greenbone AG
plugins.openvas.org
9
owncloud
multiple vulnerabilities
incomplete blacklist
remote code execution
user enumeration
csrf
authentication bypass
update required

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.6

Confidence

Low

EPSS

0.012

Percentile

85.6%

ownCloud is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:owncloud:owncloud";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.146730");
  script_version("2023-12-01T16:11:30+0000");
  script_tag(name:"last_modification", value:"2023-12-01 16:11:30 +0000 (Fri, 01 Dec 2023)");
  script_tag(name:"creation_date", value:"2021-09-21 08:37:55 +0000 (Tue, 21 Sep 2021)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_cve_id("CVE-2012-4389", "CVE-2012-4390", "CVE-2012-4391", "CVE-2012-4392");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("ownCloud < 4.0.7 Multiple Vulnerabilities (oC-SA-2012-012, oC-SA-2012-013, oC-SA-2012-014, oC-SA-2012-015)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2021 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_owncloud_http_detect.nasl");
  script_mandatory_keys("owncloud/detected");

  script_tag(name:"summary", value:"ownCloud is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2012-4389: Incomplete blacklist in lib/migrate.php allows remote attackers to execute
  arbitrary code by uploading a crafted .htaccess file in an import.zip file and accessing an
  uploaded PHP file.

  - CVE-2012-4390: apps/calendar/appinfo/remote.php and apps/contacts/appinfo/remote.php allows
  remote authenticated users to enumerate the registered users via unspecified vectors.

  - CVE-2012-4391: Cross-site request forgery (CSRF) in core/ajax/appconfig.php allows remote
  attackers to hijack the authentication of administrators for requests that edit the app
  configurations.

  - CVE-2012-4392: index.php does not properly validate the oc_token cookie, which allows remote
  attackers to bypass authentication via a crafted oc_token cookie value.");

  script_tag(name:"affected", value:"ownCloud prior to version 4.0.7.");

  script_tag(name:"solution", value:"Update to version 4.0.7 or later.");

  script_xref(name:"URL", value:"https://www.openwall.com/lists/oss-security/2012/09/02/2");
  script_xref(name:"URL", value:"https://github.com/owncloud/security-advisories/blob/master/server/oc-sa-2012-012.json");
  script_xref(name:"URL", value:"https://github.com/owncloud/security-advisories/blob/master/server/oc-sa-2012-013.json");
  script_xref(name:"URL", value:"https://github.com/owncloud/security-advisories/blob/master/server/oc-sa-2012-014.json");
  script_xref(name:"URL", value:"https://github.com/owncloud/security-advisories/blob/master/server/oc-sa-2012-015.json");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_is_less(version: version, test_version: "4.0.7")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "4.0.7", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.6

Confidence

Low

EPSS

0.012

Percentile

85.6%

Related for OPENVAS:1361412562310146730