CVE-2016-1499

Published on: 01/08/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H

Certain versions of Owncloud from Owncloud contain the following vulnerability:

ownCloud Server before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allow remote authenticated users to obtain sensitive information from a directory listing and possibly cause a denial of service (CPU consumption) via the force parameter to index.php/apps/files/ajax/scan.php.

  • CVE-2016-1499 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED LOW NONE HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE COMPLETE

CVE References

Description Tags Link
SecurityFocus www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160107 [SYSS-2015-062] ownCloud Information Exposure Through Directory Listing (CVE-2016-1499)
ownCloud 8.2.1 / 8.1.4 / 8.0.9 Information Exposure ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/135158/ownCloud-8.2.1-8.1.4-8.0.9-Information-Exposure.html
SecurityFocus www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160219 [SYSS-2015-062] ownCloud - Information Exposure Through Directory Listing (CWE-548)
Advisory | ownCloud.org Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM owncloud.org/security/advisory/?id=oc-sa-2016-002
Exploit
www.syss.de
text/plain
URL Logo MISC www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-062.txt

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOwncloudOwncloud8.1.0AllAllAll
ApplicationOwncloudOwncloud8.1.1AllAllAll
ApplicationOwncloudOwncloud8.1.3AllAllAll
ApplicationOwncloudOwncloud8.1.4AllAllAll
ApplicationOwncloudOwncloud8.2.0AllAllAll
ApplicationOwncloudOwncloud8.2.1AllAllAll
ApplicationOwncloudOwncloud8.1.0AllAllAll
ApplicationOwncloudOwncloud8.1.1AllAllAll
ApplicationOwncloudOwncloud8.1.3AllAllAll
ApplicationOwncloudOwncloud8.1.4AllAllAll
ApplicationOwncloudOwncloud8.2.0AllAllAll
ApplicationOwncloudOwncloud8.2.1AllAllAll
ApplicationOwncloudOwncloudAllAllAllAll
  • cpe:2.3:a:owncloud:owncloud:8.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:8.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*: