First published: Fri Mar 14 2014(Updated: )
ownCloud before 5.0.6 does not properly check permissions, which allows remote authenticated users to execute arbitrary API commands via unspecified vectors. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary API commands.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | <=5.0.5 | |
ownCloud | =5.0.0 | |
ownCloud | =5.0.1 | |
ownCloud | =5.0.2 | |
ownCloud | =5.0.3 | |
ownCloud | =5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2048 is classified as a medium severity vulnerability due to its potential for remote authenticated users to execute arbitrary API commands.
To fix CVE-2013-2048, you should upgrade ownCloud to version 5.0.6 or later to ensure proper permission checks.
CVE-2013-2048 affects all versions of ownCloud prior to 5.0.6.
CVE-2013-2048 can allow remote authenticated users to execute arbitrary API commands by leveraging improper permission checks.
Yes, CVE-2013-2048 can be leveraged using CSRF (Cross-Site Request Forgery) to facilitate unauthorized API command execution.