First published: Tue Nov 21 2023(Updated: )
An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ownCloud ownCloud | <10.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-49105.
The severity of CVE-2023-49105 is critical with a severity value of 9.8.
The affected software for CVE-2023-49105 is ownCloud core version up to (but not including) 10.13.1.
CVE-2023-49105 allows an attacker to access, modify, or delete any file without authentication if the username of a victim is known and the victim has no signing-key configured.
Yes, you can find more information about CVE-2023-49105 in the following references: - [ownCloud Security](https://owncloud.org/security) - [ownCloud Security Advisories - WebDAV API Authentication Bypass Using Pre-signed URLs](https://owncloud.com/security-advisories/webdav-api-authentication-bypass-using-pre-signed-urls/)