Lucene search

K
owncloudOwnCloudOC-SA-2012-002
HistoryAug 24, 2012 - 11:42 a.m.

Server: Timing attack on the password reset

2012-08-2411:42:22
owncloud.org
32

0.002 Low

EPSS

Percentile

60.4%

The “Lost Password” implementation is vulnerable to a Remote Timing Attack. The token used to secure the password reset is fetched from the database and compared to the user-specified value using the equals operator. An attacker successfully rebuilding the token can then specify an arbitrary password in POST which will overwrite the old password.

Please note that actual exploitation would require an attacker to be on the same LAN as the ownCloud server.


For more information please consult the official advisory.

This advisory is licensed CC BY-SA 4.0

0.002 Low

EPSS

Percentile

60.4%