First published: Fri Jan 08 2016(Updated: )
ownCloud Server before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2 allow remote authenticated users to obtain sensitive information from a directory listing and possibly cause a denial of service (CPU consumption) via the force parameter to index.php/apps/files/ajax/scan.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud | <=8.0.9 | |
ownCloud | =8.1.0 | |
ownCloud | =8.1.1 | |
ownCloud | =8.1.3 | |
ownCloud | =8.1.4 | |
ownCloud | =8.2.0 | |
ownCloud | =8.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1499 is classified as a medium severity vulnerability due to its potential for information exposure and denial of service.
To mitigate CVE-2016-1499, upgrade your ownCloud server to version 8.0.10, 8.1.5, or 8.2.2 or later.
CVE-2016-1499 affects ownCloud Server versions earlier than 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2.
CVE-2016-1499 can allow remote authenticated users to obtain sensitive information and potentially consume excessive CPU resources, leading to denial of service.
There is no known patch for CVE-2016-1499, so upgrading to the recommended versions is necessary to fully address the vulnerability.