First published: Mon Oct 26 2015(Updated: )
Directory traversal vulnerability in ownCloud Server before 8.0.6 and 8.1.x before 8.1.1 allows remote authenticated users to list directory contents and possibly cause a denial of service (CPU consumption) via a .. (dot dot) in the dir parameter to index.php/apps/files/ajax/scan.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | =7.0.0 | |
ownCloud | =7.0.1 | |
ownCloud | =7.0.2 | |
ownCloud | =7.0.3 | |
ownCloud | =7.0.4 | |
ownCloud | =7.0.5 | |
ownCloud | =7.0.6 | |
ownCloud | =7.0.7 | |
ownCloud | =8.0.0 | |
ownCloud | =8.0.2 | |
ownCloud | =8.0.3 | |
ownCloud | =8.0.4 | |
ownCloud | =8.0.5 | |
ownCloud | =8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6500 has a moderate severity rating as it allows remote authenticated users to potentially list directory contents and cause denial of service.
To fix CVE-2015-6500, you should upgrade to ownCloud Server version 8.0.6 or 8.1.1 or later.
CVE-2015-6500 affects ownCloud versions before 8.0.6 and 8.1.x prior to 8.1.1.
CVE-2015-6500 requires authentication, so only authenticated users can exploit this vulnerability.
CVE-2015-6500 can lead to increased CPU consumption, potentially causing denial of service.