Maintainers of the open-source file-sharing software, ownCloud, have raised alarms concerning three critical security vulnerabilities that could potentially expose users to data breaches and unauthorized file alterations.
These vulnerabilities encompass disclosure of sensitive credentials and configuration details, WebDAV API authentication bypass, and a subdomain validation bypass, each posing substantial risks to ownCloud users. The disclosed flaws impact specific versions of ownCloud, with severity scores ranging from 9.0 to 10.0 on the Common Vulnerability Scoring System (CVSS).
The first vulnerability, affecting containerized deployments using graphapi versions from 0.2.0 to 0.3.0, can expose sensitive PHP environment configuration details, potentially divulging critical information like admin passwords, mail server credentials, and license keys. ownCloud recommends immediate remediation by deleting specific files and disabling the ‘phpinfo’ function.
Furthermore, users are urged to alter sensitive credentials, such as admin passwords and server access keys, to bolster security measures against potential exploits.
The other two vulnerabilities enable a bypass of WebDAV API authentication and subdomain validation, leading to file manipulation without authentication and improper access control. To mitigate these risks, ownCloud suggests adopting fixes, including adjustments to validation codes and disabling specific features.
The severity of these vulnerabilities underscores the urgency for users to implement recommended fixes promptly to secure their systems and prevent unauthorized access or data breaches through exploitation of these critical flaws.