First published: Wed Feb 04 2015(Updated: )
The documents application in ownCloud Server 6.x before 6.0.6 and 7.x before 7.0.3 allows remote authenticated users to obtain all valid session IDs via an unspecified API method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | =6.0.0 | |
ownCloud | =6.0.1 | |
ownCloud | =6.0.2 | |
ownCloud | =6.0.3 | |
ownCloud | =6.0.4 | |
ownCloud | =6.0.5 | |
ownCloud | =7.0.0 | |
ownCloud | =7.0.1 | |
ownCloud | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9049 has a moderate severity rating due to its potential to expose valid session IDs to remote authenticated users.
To fix CVE-2014-9049, upgrade ownCloud Server to version 6.0.6 or 7.0.3 or later, which includes the necessary security patches.
Users of ownCloud Server versions 6.x prior to 6.0.6 and 7.x prior to 7.0.3 are affected by CVE-2014-9049.
CVE-2014-9049 can allow an attacker with authenticated access to retrieve all valid session IDs, potentially allowing unauthorized access to user sessions.
CVE-2014-9049 was disclosed in November 2014, and users were advised to take immediate action to secure their installations.