First published: Mon Oct 06 2014(Updated: )
Incomplete blacklist vulnerability in ajax/upload.php in ownCloud before 5.0, when running on Windows, allows remote authenticated users to bypass intended access restrictions, upload files with arbitrary names, and execute arbitrary code via an Alternate Data Stream (ADS) syntax in the filename parameter, as demonstrated using .htaccess::$DATA to upload a PHP program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | <=4.5.13 | |
ownCloud | =3.0.0 | |
ownCloud | =3.0.1 | |
ownCloud | =3.0.2 | |
ownCloud | =3.0.3 | |
ownCloud | =4.0.0 | |
ownCloud | =4.0.1 | |
ownCloud | =4.0.2 | |
ownCloud | =4.0.3 | |
ownCloud | =4.0.4 | |
ownCloud | =4.0.5 | |
ownCloud | =4.0.6 | |
ownCloud | =4.0.7 | |
ownCloud | =4.0.8 | |
ownCloud | =4.0.9 | |
ownCloud | =4.0.10 | |
ownCloud | =4.0.11 | |
ownCloud | =4.0.12 | |
ownCloud | =4.0.13 | |
ownCloud | =4.0.14 | |
ownCloud | =4.0.15 | |
ownCloud | =4.0.16 | |
ownCloud | =4.5.0 | |
ownCloud | =4.5.1 | |
ownCloud | =4.5.2 | |
ownCloud | =4.5.3 | |
ownCloud | =4.5.4 | |
ownCloud | =4.5.5 | |
ownCloud | =4.5.6 | |
ownCloud | =4.5.7 | |
ownCloud | =4.5.8 | |
ownCloud | =4.5.9 | |
ownCloud | =4.5.10 | |
ownCloud | =4.5.11 | |
ownCloud | =4.5.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2044 has a high severity rating due to its potential for remote code execution.
To fix CVE-2014-2044, upgrade to ownCloud version 5.0 or later, which addresses the vulnerability.
CVE-2014-2044 affects ownCloud versions prior to 5.0, particularly on Windows platforms.
CVE-2014-2044 is categorized as an incomplete blacklist vulnerability allowing unauthorized file uploads and code execution.
Yes, CVE-2014-2044 can be exploited by remote authenticated users to bypass access controls.