First published: Wed Oct 21 2015(Updated: )
The filename sanitization component in ownCloud Server before 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4 does not properly handle $_GET parameters cast by PHP to an array, which allows remote attackers to cause a denial of service (infinite loop and log file consumption) via crafted endpoint file names.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | <=6.0.7 | |
ownCloud | =7.0.0 | |
ownCloud | =7.0.1 | |
ownCloud | =7.0.2 | |
ownCloud | =7.0.3 | |
ownCloud | =7.0.4 | |
ownCloud | =7.0.5 | |
ownCloud | =8.0.0 | |
ownCloud | =8.0.2 | |
ownCloud | =8.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4717 is considered a moderate severity vulnerability due to its ability to cause a denial of service.
To mitigate CVE-2015-4717, upgrade ownCloud Server to version 6.0.8, 7.0.6, or 8.0.4 or later.
CVE-2015-4717 affects ownCloud Server versions prior to 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4.
Yes, CVE-2015-4717 can be exploited remotely by attackers to trigger a denial of service.
The consequence of CVE-2015-4717 includes potential infinite loops and excessive log file consumption leading to denial of service.