Due to an incorrect usage of an ownCloud internal file system function the passed path to the file scanner was resolved relatively. An authenticated adversary may thus be able to get a listing of files existing on the filesystem. However, it is not possible to access any of these files.
This causes a massive server load and thus an enumeration of the whole server content is unlikely due to the high risk of Denial of Service.
For a more technical description please take a look at the advisory of the reporter.
The vulnerable vulnerable component has been patched and will be replaced by a cronjob in ownCloud 9.0.
The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory: