Lucene search

K
owncloudAndreas Fischer – ownCloud Inc. ([email protected]) – Vulnerability discovery and disclosure.OWNCLOUD:9F0A6298E2F679AAF3FFE9CBFF23B5E7
HistoryAug 24, 2012 - 9:42 a.m.

Timing attack on the password reset - ownCloud

2012-08-2409:42:30
Andreas Fischer – ownCloud Inc. ([email protected]) – Vulnerability discovery and disclosure.
owncloud.org
29

0.002 Low

EPSS

Percentile

60.4%

The “Lost Password” implementation is vulnerable to a Remote Timing Attack. The token used to secure the password reset is fetched from the database and compared to the user-specified value using the equals operator. An attacker successfully rebuilding the token can then specify an arbitrary password in POST which will overwrite the old password.

Please note that actual exploitation would require an attacker to be on the same LAN as the ownCloud server.

Affected Software

  • ownCloud Server < 4.5.1 (CVE-2012-5607)
  • ownCloud Server < 4.0.9 (CVE-2012-5607)

Action Taken

It is recommended that all instances are upgraded to ownCloud Server 4.5.1 or 4.0.10.

Acknowledgements

The ownCloud team thanks the following people for their research and responsible disclosure of the above advisory:

  • Andreas Fischer - ownCloud Inc. ([email protected]) - Vulnerability discovery and disclosure.

0.002 Low

EPSS

Percentile

60.4%

Related for OWNCLOUD:9F0A6298E2F679AAF3FFE9CBFF23B5E7