ownCloud Local File Inclusion Vulnerability -01 Aug14
2014-08-25T00:00:00
ID OPENVAS:1361412562310804821 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2018-10-12T00:00:00
Description
This host is installed with ownCloud and is prone to local file inclusion
vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_owncloud_local_file_inclusion_vuln_aug14.nasl 11867 2018-10-12 10:48:11Z cfischer $
#
# ownCloud Local File Inclusion Vulnerability -01 Aug14
#
# Authors:
# Shakeel <bshakeel@secpod.com>
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:owncloud:owncloud";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.804821");
script_version("$Revision: 11867 $");
script_cve_id("CVE-2014-4929");
script_bugtraq_id(68975);
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_tag(name:"last_modification", value:"$Date: 2018-10-12 12:48:11 +0200 (Fri, 12 Oct 2018) $");
script_tag(name:"creation_date", value:"2014-08-25 21:35:23 +0530 (Mon, 25 Aug 2014)");
script_name("ownCloud Local File Inclusion Vulnerability -01 Aug14");
script_tag(name:"summary", value:"This host is installed with ownCloud and is prone to local file inclusion
vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The flaw exists due to the Routing component not properly sanitizing
user-supplied input to the 'filename' parameter in a require_once statement.");
script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to reinstall the instance
overwriting the existing configuration or execute arbitrary PHP code or disclose
the contents of any file on the system.");
script_tag(name:"affected", value:"ownCloud Server 5.0.x before version 5.0.17, 6.0.x before version 6.0.4");
script_tag(name:"solution", value:"Upgrade to ownCloud version 5.0.17 or 6.0.4 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"http://owncloud.org/changelog/");
script_xref(name:"URL", value:"http://secunia.com/advisories/59543");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"remote_banner");
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("Web application abuses");
script_dependencies("gb_owncloud_detect.nasl");
script_mandatory_keys("owncloud/installed");
script_require_ports("Services/www", 80);
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if(!ownPort = get_app_port(cpe:CPE)){
exit(0);
}
if(!ownVer = get_app_version(cpe:CPE, port:ownPort)){
exit(0);
}
if(ownVer =~ "^(5|6)")
if(version_in_range(version:ownVer, test_version:"5.0.0", test_version2:"5.0.16")||
version_in_range(version:ownVer, test_version:"6.0.0", test_version2:"6.0.3"))
{
security_message(port:ownPort);
exit(0);
}
{"id": "OPENVAS:1361412562310804821", "type": "openvas", "bulletinFamily": "scanner", "title": "ownCloud Local File Inclusion Vulnerability -01 Aug14", "description": "This host is installed with ownCloud and is prone to local file inclusion\nvulnerability.", "published": "2014-08-25T00:00:00", "modified": "2018-10-12T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804821", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["http://owncloud.org/changelog/", "http://secunia.com/advisories/59543"], "cvelist": ["CVE-2014-4929"], "lastseen": "2019-05-29T18:37:17", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-4929"]}, {"type": "owncloud", "idList": ["OC-SA-2014-018", "OWNCLOUD:1DF7A5F9B5502CE9032DFCD26CF158C0"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2014-140.NASL"]}], "modified": "2019-05-29T18:37:17", "rev": 2}, "score": {"value": 6.0, "vector": "NONE", "modified": "2019-05-29T18:37:17", "rev": 2}, "vulnersScore": 6.0}, "pluginID": "1361412562310804821", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_owncloud_local_file_inclusion_vuln_aug14.nasl 11867 2018-10-12 10:48:11Z cfischer $\n#\n# ownCloud Local File Inclusion Vulnerability -01 Aug14\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:owncloud:owncloud\";\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804821\");\n script_version(\"$Revision: 11867 $\");\n script_cve_id(\"CVE-2014-4929\");\n script_bugtraq_id(68975);\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 12:48:11 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2014-08-25 21:35:23 +0530 (Mon, 25 Aug 2014)\");\n script_name(\"ownCloud Local File Inclusion Vulnerability -01 Aug14\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with ownCloud and is prone to local file inclusion\nvulnerability.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The flaw exists due to the Routing component not properly sanitizing\nuser-supplied input to the 'filename' parameter in a require_once statement.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to reinstall the instance\noverwriting the existing configuration or execute arbitrary PHP code or disclose\nthe contents of any file on the system.\");\n script_tag(name:\"affected\", value:\"ownCloud Server 5.0.x before version 5.0.17, 6.0.x before version 6.0.4\");\n script_tag(name:\"solution\", value:\"Upgrade to ownCloud version 5.0.17 or 6.0.4 or later.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://owncloud.org/changelog/\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/59543\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_owncloud_detect.nasl\");\n script_mandatory_keys(\"owncloud/installed\");\n script_require_ports(\"Services/www\", 80);\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!ownPort = get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(!ownVer = get_app_version(cpe:CPE, port:ownPort)){\n exit(0);\n}\n\nif(ownVer =~ \"^(5|6)\")\n\nif(version_in_range(version:ownVer, test_version:\"5.0.0\", test_version2:\"5.0.16\")||\n version_in_range(version:ownVer, test_version:\"6.0.0\", test_version2:\"6.0.3\"))\n{\n security_message(port:ownPort);\n exit(0);\n}\n", "naslFamily": "Web application abuses", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T06:14:31", "description": "Directory traversal vulnerability in the routing component in ownCloud Server before 5.0.17 and 6.0.x before 6.0.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in a filename, related to index.php.", "edition": 6, "cvss3": {}, "published": "2014-08-20T14:55:00", "title": "CVE-2014-4929", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-4929"], "modified": "2014-08-21T14:44:00", "cpe": ["cpe:/a:owncloud:owncloud:5.0.0", "cpe:/a:owncloud:owncloud:5.0.1", "cpe:/a:owncloud:owncloud:6.0.1", "cpe:/a:owncloud:owncloud:6.0.0", "cpe:/a:owncloud:owncloud:5.0.11", "cpe:/a:owncloud:owncloud:5.0.5", "cpe:/a:owncloud:owncloud:5.0.9", "cpe:/a:owncloud:owncloud:5.0.4", "cpe:/a:owncloud:owncloud:5.0.16", "cpe:/a:owncloud:owncloud:5.0.13", "cpe:/a:owncloud:owncloud:5.0.6", "cpe:/a:owncloud:owncloud:5.0.7", "cpe:/a:owncloud:owncloud:6.0.2", "cpe:/a:owncloud:owncloud:5.0.15", "cpe:/a:owncloud:owncloud:5.0.2", "cpe:/a:owncloud:owncloud:6.0.3", "cpe:/a:owncloud:owncloud:5.0.8", "cpe:/a:owncloud:owncloud:5.0.10", "cpe:/a:owncloud:owncloud:5.0.3", "cpe:/a:owncloud:owncloud:5.0.14", "cpe:/a:owncloud:owncloud:5.0.12"], "id": "CVE-2014-4929", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4929", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*"]}], "owncloud": [{"lastseen": "2018-01-11T22:53:30", "bulletinFamily": "software", "cvelist": ["CVE-2014-4929"], "description": "Due to an improper control of the filename for a `require_once()` statement in the routing component a limited local file inclusion vulnerability is existent in all below mentioned ownCloud versions.\n\nDepending on the ownCloud configuration and the authentication state of a remote attacker this vulnerability may have different impact. Specifically:\n\n * An unauthenticated remote attacker is able to reinstall the instance in case he is able to connect to a database or the SQLite driver is installed. This will overwrite the existing configuration and existing users will not be able to login anymore. This attack is very likely to be noticed, however an attacker is granted administrative access to the ownCloud instance. If a backup of the configuration file is accessible for the web server user the attacker might restore it after a successful exploitation to cover the attack\n * An unauthenticated remote attacker is able to execute arbitrary PHP code if he is able to upload files using the public upload functionality and he can guess the full path of the folder.\n * An authenticated remote attacker is able to execute arbitrary PHP code if the `/data/` directory is below the ownCloud root. The directory can be moved using the `datadirectory` configuration in `config/config.php`.\n\nownCloud Inc. is currently not aware of any active attack that are exploiting this vulnerability. To verify whether your installation might have been attacked you can use the following regular expression: `index.php\\/[^ /]+\\/[^ /]+\\/[\\.]+\\/[\\.]+\\/`. (e.g. `cat /var/log/apache2/access_log | grep -i -E 'index.php\\/[^ /]+\\/[^ /]+\\/[\\.]+\\/[\\.]+\\/*'`)\n\nPlease contact security@owncloud.com if you have proof that you've been attacked using this vulnerability.\n\n### Affected Software\n\n * ownCloud Server < **6.0.4** (CVE-2014-4929)\n * ownCloud Server < **5.0.17** (CVE-2014-4929)\n\n### Action Taken\n\nThe ownCloud team has taken the following efforts to prevent further such attacks in the future:\n\n * All usages of potential dangerous functions including files in core have been reviewed.\n * All insecure usages of those functions have been fixed and deprecated, the specific parts routing component will be rewritten for ownCloud 8 to further harden the security.\n * The setup routine has been refactored. It will be no longer possible to call it directly beginning with ownCloud 7.\n\n### Acknowledgements\n\nThe ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:\n\n * Lukas Reschke - ownCloud Inc. (lukas@owncloud.org) - Vulnerability discovery and disclosure.\n", "edition": 1, "modified": "2018-01-03T18:31:06", "published": "2014-07-15T18:30:18", "href": "https://owncloud.org/security/advisories/local-file-inclusion-core/", "id": "OWNCLOUD:1DF7A5F9B5502CE9032DFCD26CF158C0", "type": "owncloud", "title": "Local file inclusion in core - ownCloud", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2016-09-26T21:06:24", "bulletinFamily": "software", "cvelist": ["CVE-2014-4929"], "edition": 1, "description": "Due to an improper control of the filename for a `require_once()` statement in the routing component a limited local file inclusion vulnerability is existent in all below mentioned ownCloud versions.\n\nDepending on the ownCloud configuration and the authentication state of a remote attacker this vulnerability may have different impact. Specifically:\n\n * An unauthenticated remote attacker is able to reinstall the instance in case he is able to connect to a database or the SQLite driver is installed. This will overwrite the existing configuration and existing users will not be able to login anymore. This attack is very likely to be noticed, however an attacker is granted administrative access to the ownCloud instance. If a backup of the configuration file is accessible for the web server user the attacker might restore it after a successful exploitation to cover the attack\n * An unauthenticated remote attacker is able to execute arbitrary PHP code if he is able to upload files using the public upload functionality and he can guess the full path of the folder.\n * An authenticated remote attacker is able to execute arbitrary PHP code if the `/data/` directory is below the ownCloud root. The directory can be moved using the `datadirectory` configuration in `config/config.php`.\n\nownCloud Inc. is currently not aware of any active attack that are exploiting this vulnerability. To verify whether your installation might have been attacked you can use the following regular expression: `index.php\\/[^ /]+\\/[^ /]+\\/[\\.]+\\/[\\.]+\\/`. (e.g. `cat /var/log/apache2/access_log | grep -i -E 'index.php\\/[^ /]+\\/[^ /]+\\/[\\.]+\\/[\\.]+\\/*'`)\n\nPlease contact security@owncloud.com if you have proof that you've been attacked using this vulnerability.\n\n \n\n\n* * *\n\n**[For more information please consult the official advisory.](<https://owncloud.org/security/advisory/?id=oC-SA-2014-018>)**\n\n\nThis advisory is licensed [CC BY-SA 4.0](https://creativecommons.org/licenses/by-sa/4.0/)", "modified": "2014-07-15T20:10:05", "published": "2014-07-15T20:10:05", "id": "OC-SA-2014-018", "href": "https://owncloud.org/security/advisory/?id=oC-SA-2014-018", "type": "owncloud", "title": "Server: Local file inclusion in core", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-07T11:54:40", "description": "Updated owncloud package fixes security vulnerability :\n\nIn ownCloud before 5.0.17 and 6.0.4, there exists a limited local file\ninclusion vulnerability due to an improper control of the filename for\na require_once() statement in the routing component (CVE-2014-4929).\n\nSee the upstream Changelog for more information.", "edition": 25, "published": "2014-07-30T00:00:00", "title": "Mandriva Linux Security Advisory : owncloud (MDVSA-2014:140)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-4929"], "modified": "2014-07-30T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:owncloud"], "id": "MANDRIVA_MDVSA-2014-140.NASL", "href": "https://www.tenable.com/plugins/nessus/76886", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:140. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76886);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-4929\");\n script_bugtraq_id(68975);\n script_xref(name:\"MDVSA\", value:\"2014:140\");\n\n script_name(english:\"Mandriva Linux Security Advisory : owncloud (MDVSA-2014:140)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandriva Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated owncloud package fixes security vulnerability :\n\nIn ownCloud before 5.0.17 and 6.0.4, there exists a limited local file\ninclusion vulnerability due to an improper control of the filename for\na require_once() statement in the routing component (CVE-2014-4929).\n\nSee the upstream Changelog for more information.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0301.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://owncloud.org/security/advisory/?id=oc-sa-2014-018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://owncloud.org/changelog/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected owncloud package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:owncloud\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", reference:\"owncloud-5.0.17-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}