Vulnerability Name: | CVE-2016-9467 (CCN-123845) | ||||||||||||
Assigned: | 2016-10-10 | ||||||||||||
Published: | 2016-10-10 | ||||||||||||
Updated: | 2019-10-09 | ||||||||||||
Summary: | Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user. | ||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
2.7 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-284 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-9467 Source: XF Type: UNKNOWN nextcloud-owncloud-cve20169467-spoofing(123845) Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4 Source: MISC Type: Exploit, Third Party Advisory https://hackerone.com/reports/154827 Source: CCN Type: nextCloud Security Advisory NC-SA-2016-010 Content-Spoofing in "files" app Source: MISC Type: Patch, Vendor Advisory https://nextcloud.com/security/advisory/?id=nc-sa-2016-010 Source: CCN Type: ownCloud Security Advisory oC-SA-2016-020 Content-Spoofing in "files" app Source: MISC Type: Patch, Vendor Advisory https://owncloud.org/security/advisory/?id=oc-sa-2016-020 Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-9467 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |