Vulnerability Details : CVE-2015-4715
The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values.
Products affected by CVE-2015-4715
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-4715
1.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-4715
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
NIST |
CWE ids for CVE-2015-4715
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-4715
-
http://www.securityfocus.com/bid/76158
ownCloud CVE-2015-4715 Arbitrary File Read VulnerabilityThird Party Advisory;VDB Entry
-
https://owncloud.org/security/advisory/?id=oc-sa-2015-005
Security Advisories – ownCloudVendor Advisory
-
https://github.com/owncloud/core/commit/bf0f1a50926a75a26a42a3da4d62e84a489ee77a
Revert custom patch that can cause problems · owncloud/core@bf0f1a5 · GitHubPatch;Third Party Advisory
-
https://owncloud.org/security/advisories/mounted-dropbox-storage-allows-dropbox-com-access-file/
Mounted Dropbox storage allows "Dropbox.com" to access any file – ownCloudVendor Advisory
Jump to