First published: Mon Apr 22 2013(Updated: )
The contacts application in ownCloud before 4.5.10 and 5.x before 5.0.5 does not properly check the ownership of contacts, which allows remote authenticated users to download arbitrary contacts via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | <=4.5.9 | |
ownCloud | =4.5.0 | |
ownCloud | =4.5.1 | |
ownCloud | =4.5.2 | |
ownCloud | =4.5.3 | |
ownCloud | =4.5.4 | |
ownCloud | =4.5.5 | |
ownCloud | =4.5.6 | |
ownCloud | =4.5.7 | |
ownCloud | =4.5.8 | |
ownCloud | =5.0.0 | |
ownCloud | =5.0.1 | |
ownCloud | =5.0.2 | |
ownCloud | =5.0.3 | |
ownCloud | =5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1963 has a high severity due to allowing unauthorized access to sensitive contact information.
To fix CVE-2013-1963, upgrade ownCloud to version 4.5.10 or above, or to 5.0.5 or above.
CVE-2013-1963 affects ownCloud versions prior to 4.5.10 and 5.x versions before 5.0.5.
CVE-2013-1963 allows remote authenticated users to download arbitrary contacts, potentially leading to data exposure.
There are no known workarounds for CVE-2013-1963; updating to a secure version is the recommended action.