First published: Mon Feb 17 2020(Updated: )
The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud ownCloud | <6.0.8 | |
ownCloud ownCloud | >=7.0.0<7.0.6 | |
ownCloud ownCloud | >=8.0.0<8.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4715 is a vulnerability in ownCloud Server that allows remote administrators of Dropbox.com to read arbitrary files.
CVE-2015-4715 has a severity level of medium.
ownCloud Server before version 6.0.8, version 7.x before 7.0.6, and version 8.x before 8.0.4 are affected by CVE-2015-4715.
Remote administrators of Dropbox.com can exploit CVE-2015-4715 by using an @ (at sign) character in unspecified POST requests.
You can find more information about CVE-2015-4715 at the following references: [http://www.securityfocus.com/bid/76158](http://www.securityfocus.com/bid/76158), [https://github.com/owncloud/core/commit/bf0f1a50926a75a26a42a3da4d62e84a489ee77a](https://github.com/owncloud/core/commit/bf0f1a50926a75a26a42a3da4d62e84a489ee77a), [https://owncloud.org/security/advisories/mounted-dropbox-storage-allows-dropbox-com-access-file/](https://owncloud.org/security/advisories/mounted-dropbox-storage-allows-dropbox-com-access-file/)