Post Now
Image

OwnCloud is a self-hosted, open-source file sync and sharing solution for individuals and organizations to manage and share files.

The file sharing software ownCloud recently disclosed three critical-severity security vulnerabilities. These vulnerabilities pose a serious risk as they could potentially be exploited to access sensitive information and modify files.

ownCloud is an open-source file sync and sharing solution designed for individuals and organizations wishing to manage and share files through a self-hosted platform.

OwnCloud is a self-hosted, open-source file sync and sharing solution for individuals and organizations to manage and share files.

ownCloud is chosen by businesses, enterprises, educational institutions, government agencies, and individuals, prioritizing controlling their data instead of relying on third-party cloud storage providers. According to ownCloud's official site, the platform boasts an impressive user base, with 200,000 installations, 600 enterprise customers, and a user count reaching 200 million.

The development team responsible for the project recently released three security bulletins, cautioning users about vulnerabilities in three distinct components of ownCloud that could severely impact its integrity. This potentially leads to exposure of sensitive information, stealthy data theft, phishing attacks, and more.

The first flaw is tracked as CVE-2023-49103 and received a maximum CVSS v3 score of 10. The flaw can be used to steal credentials and configuration information in containerized deployments, impacting all environment variables of the webserver.

Impacting graphapi 0.2.0 through 0.3.0, the problem arises from the app's dependency on a third-party library that exposes PHP environment details through a URL. This information includes all the environment variables of the web server. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key.

As a fix, ownCloud is recommending deleting the 'owncloud/apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php' file, disabling the 'phpinfo' function in Docker containers, and changing potentially exposed secrets like the ownCloud admin password and mail server, database credentials, and Object-Store/S3 access keys.

With a CVSS v3 score of 9.8, the second issue impacts ownCloud core library versions 10.6.0 to 10.13.0 and is an authentication bypass problem. The flaw makes it possible for attackers to access, modify, or delete any file without authentication if the user's username is known and they have not configured a signing key (default setting).

The third flaw, rated less severe with a CVSS v3 score of 9, affects all oauth2 library versions below 0.6.1. In the oauth2 app, attackers can exploit this flaw by using a specially crafted redirect URL to circumvent validation, enabling them to redirect callbacks to a domain under the attacker's control. It is advised to strengthen the validation code in the Oauth2 app to address this issue. A temporary solution in the bulletin is disabling the "Allow Subdomains" option.

Security vulnerabilities in file-sharing platforms have been under constant attack, with ransomware groups like CLOP using them in data theft attacks on thousands of companies worldwide.

Due to this, it is crucial for ownCloud administrators to promptly implement the suggested fixes and carry out library updates as soon as possible to mitigate potential risks effectively.

Want your digital assets to be protected? 

CyberShelter provides innovative and modern cybersecurity products and niche services to individuals and organization against all kinds of cyber threats.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?