Incomplete blacklist vulnerability in ajax/upload.php in ownCloud before 5.0, when running on Windows, allows remote authenticated users to bypass intended access restrictions, upload files with arbitrary names, and execute arbitrary code via an Alternate Data Stream (ADS) syntax in the filename parameter, as demonstrated using .htaccess::$DATA to upload a PHP program.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/125585/ownCloud-4.0.x-4.5.x-Remote-Code-Execution.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Mar/45 - | |
References | () http://secunia.com/advisories/57267 - | |
References | () http://www.exploit-db.com/exploits/32162 - Exploit | |
References | () http://www.osvdb.org/104082 - | |
References | () http://www.securityfocus.com/archive/1/531365/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/66000 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/91757 - | |
References | () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2044/ - Exploit |
Information
Published : 2014-10-06 23:55
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2044
Mitre link : CVE-2014-2044
CVE.ORG link : CVE-2014-2044
JSON object : View
Products Affected
owncloud
- owncloud
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')