Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAD1Nwhg9ZghcvW8Uehcge-PMdk8jg-O5EFoeKgmB-pERiRGJAA@mail.gmail.com>
Date: Wed, 3 Apr 2013 19:23:40 +0200
From: Lukas Reschke <lukas@...cloud.org>
To: oss-security@...ts.openwall.com
Cc: "security@...cloud.com" <security@...cloud.com>
Subject: ownCloud Security Advisories (2013-011, 2013-012)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

To avoid confusion: The download links are pointing to 5.0.3 since it was
just released one day after 5.0.1 (and 5.0.2) because of two nasty upgrade
bugs.

This bugs are only affecting the 5.0 branch.

--------------------

# Multiple XSS vulnerabilities (oC-SA-2013-011)

Web: http://owncloud.org/about/security/advisories/oC-SA-2013-011/


## CVE IDENTIFIERS
- - CVE-2013-1890


## AFFECTED SOFTWARE
- - ownCloud Server < 5.0.1


## DESCRIPTION
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud 5.0.0
allow remote attackers to inject arbitrary web script or HTML via


- - the "new_name" POST parameter to renameTag.php in /apps/bookmarks/ajax/
  - Commits: 1c63eb1 (stable5)
  - Risk: Medium
  - Note: Successful exploitation of this stored XSS requires the
“bookmark” app to be enabled. (enabled by default)
- - multiple unspecified parameters to several files in apps/contacts/ajax/
  - Commits: ae9e5a4 (stable5)
  - Risk: Medium
  - Note: Successful exploitation of this stored XSS requires the
“calendar” app to be enabled. (enabled by default)


## Credits
The ownCloud Team would like to thank Dylan Irzi
(http://websecuritydev.com/) for discovering this vulnerabilities.


## RESOLUTION
Update to ownCloud Server 5.0.3
http://download.owncloud.org/community/owncloud-5.0.3.tar.bz2




- --------------------


# contacts: SQL Injection (oC-SA-2013-012)


Web: http://owncloud.org/about/security/advisories/oC-SA-2013-012/


## CVE IDENTIFIERS
- - CVE-2013-1893


## AFFECTED SOFTWARE
- - ownCloud Server < 5.0.1

## RISK
- Critical

## Commits
- stable5: c1b62af


## DESCRIPTION
ownCloud before 5.0.1 does not neutralize special elements that are passed
to the SQL query in addressbookprovider.php which therefore allows an
authenticated attacker to execute arbitrary SQL commands.


Note: Successful exploitation of this vulnerability requires the "contacts"
application to be enabled. (enabled by default)


## Credits
The ownCloud Team would like to thank Alexander Bürger for discovering this
vulnerability.


## RESOLUTION
Update to ownCloud Server 5.0.3
http://download.owncloud.org/community/owncloud-5.0.3.tar.bz2

-- 
ownCloud
Your Cloud, Your Data, Your Way!




GPG: 0xEB32B77BA406BE99

-----BEGIN PGP SIGNATURE-----
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=LD+w
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.