ownCloud Multiple Vulnerabilities
Release Date : 2012-04-19
Criticality level : Less critical
Impact : Cross Site Scripting
Where : From remote
Solution Status : Unpatched
Software: ownCloud 3.x
Tobias Glemser has discovered a weakness and some vulnerabilities in ownCloud, which can be exploited by malicious people to conduct spoofing, cross-site scripting, and cross-site request forgery attacks.
1) Input passed via the "redirect_url" parameter to index.php is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.
2) Input passed via the "redirect_url" parameter to index.php and the "files" parameter to files/ajax/download.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. conduct script insertion attacks via editing contacts when a logged-in user visits a specially crafted web page.
The weakness and the vulnerabilities are confirmed in version 3.0.2. Other versions may also be affected.
Edit the source code to ensure that input is properly sanitised and verified. Do not browse untrusted sites or follow untrusted links while being logged-in to the application.
Provided and/or discovered by:
Tobias Glemser, Tele-Consulting.