First published: Mon Feb 13 2023(Updated: )
The ownCloud Android app allows ownCloud users to access, share, and edit files and folders. Prior to version 3.0, the app has an incomplete fix for a path traversal issue and is vulnerable to two bypass methods. The bypasses may lead to information disclosure when uploading the app’s internal files, and to arbitrary file write when uploading plain text files (although limited by the .txt extension). Version 3.0 fixes the reported bypasses.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Owncloud Owncloud | <3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24804 is a vulnerability in the ownCloud Android app that allows users to access, share, and edit files and folders.
CVE-2023-24804 allows for information disclosure when uploading the app's internal files due to an incomplete fix for a path traversal issue and two bypass methods.
The severity of CVE-2023-24804 is medium with a CVSS score of 4.4.
To fix CVE-2023-24804, you should update the ownCloud Android app to version 3.0 or later.
You can find more information about CVE-2023-24804 in the following references: [HackerOne report](https://hackerone.com/reports/377107), [ownCloud security advisory](https://owncloud.com/security-advisories/oc-sa-2023-001/), [GitHub Security Lab advisories](https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/).