CVE-2016-9467

Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
References
Link Resource
https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a Issue Tracking Patch Third Party Advisory
https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d Issue Tracking Patch Third Party Advisory
https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4 Issue Tracking Patch Third Party Advisory
https://hackerone.com/reports/154827 Exploit Third Party Advisory
https://nextcloud.com/security/advisory/?id=nc-sa-2016-010 Patch Vendor Advisory
https://owncloud.org/security/advisory/?id=oc-sa-2016-020 Patch Vendor Advisory
https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071 Issue Tracking Patch Third Party Advisory
https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a Issue Tracking Patch Third Party Advisory
https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d Issue Tracking Patch Third Party Advisory
https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4 Issue Tracking Patch Third Party Advisory
https://hackerone.com/reports/154827 Exploit Third Party Advisory
https://nextcloud.com/security/advisory/?id=nc-sa-2016-010 Patch Vendor Advisory
https://owncloud.org/security/advisory/?id=oc-sa-2016-020 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960 - Issue Tracking, Patch, Third Party Advisory () https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013 - Issue Tracking, Patch, Third Party Advisory () https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1 - Issue Tracking, Patch, Third Party Advisory () https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14 - Issue Tracking, Patch, Third Party Advisory () https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071 - Issue Tracking, Patch, Third Party Advisory () https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a - Issue Tracking, Patch, Third Party Advisory () https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d - Issue Tracking, Patch, Third Party Advisory () https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4 - Issue Tracking, Patch, Third Party Advisory () https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4 - Issue Tracking, Patch, Third Party Advisory
References () https://hackerone.com/reports/154827 - Exploit, Third Party Advisory () https://hackerone.com/reports/154827 - Exploit, Third Party Advisory
References () https://nextcloud.com/security/advisory/?id=nc-sa-2016-010 - Patch, Vendor Advisory () https://nextcloud.com/security/advisory/?id=nc-sa-2016-010 - Patch, Vendor Advisory
References () https://owncloud.org/security/advisory/?id=oc-sa-2016-020 - Patch, Vendor Advisory () https://owncloud.org/security/advisory/?id=oc-sa-2016-020 - Patch, Vendor Advisory

Information

Published : 2017-03-28 02:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9467

Mitre link : CVE-2016-9467

CVE.ORG link : CVE-2016-9467


JSON object : View

Products Affected

owncloud

  • owncloud

nextcloud

  • nextcloud_server
CWE
CWE-451

User Interface (UI) Misrepresentation of Critical Information

CWE-284

Improper Access Control