Vulnerability Details : CVE-2016-9463
Potential exploit
Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.1.2, 9.0.6, and 8.2.9 suffer from SMB User Authentication Bypass. Nextcloud/ownCloud include an optional and not by default enabled SMB authentication component that allows authenticating users against an SMB server. This backend is implemented in a way that tries to connect to a SMB server and if that succeeded consider the user logged-in. The backend did not properly take into account SMB servers that have any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials. Note: The SMB backend is disabled by default and requires manual configuration in the Nextcloud/ownCloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability.
Vulnerability category: BypassGain privilege
Products affected by CVE-2016-9463
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9463
3.86%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9463
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2016-9463
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.Assigned by: support@hackerone.com (Secondary)
References for CVE-2016-9463
-
https://owncloud.org/security/advisory/?id=oc-sa-2016-017
Security Advisories – ownCloudPatch;Vendor Advisory
-
https://hackerone.com/reports/148151
#148151 SMB User Authentication Bypass and PersistenceExploit;Third Party Advisory
-
https://nextcloud.com/security/advisory/?id=nc-sa-2016-006
advisory – NextcloudPatch;Vendor Advisory
-
https://github.com/owncloud/apps/commit/5d47e7b52646cf79edadd78ce10c754290cbb732
Merge pull request #2198 from owncloud/smb-auth-fix · owncloud/apps@5d47e7b · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://github.com/nextcloud/apps/commit/b85ace6840b8a6704641086bc3b8eb8e81cb2274
Double verify the SMB response · nextcloud/apps@b85ace6 · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://github.com/owncloud/apps/commit/a0e07b7ddd5a5fd850a6e07f8457d05b76a300b3
[stable8.2] Merge pull request #2198 from owncloud/smb-auth-fix · owncloud/apps@a0e07b7 · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://github.com/owncloud/apps/commit/16cbccfc946c8711721fa684d78135ca1fb64791
[stable9] Merge pull request #2198 from owncloud/smb-auth-fix · owncloud/apps@16cbccf · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://github.com/nextcloud/apps/commit/decb91fd31f4ffab191cbf09ce4e5c55c67a4087
Double verify the SMB response · nextcloud/apps@decb91f · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://rhinosecuritylabs.com/2016/10/operation-ownedcloud-exploitation-post-exploitation-persistence/
Operation OwnedCloud: Exploitation and Post-exploitation Persistence - Rhino Security LabsExploit;Technical Description;Third Party Advisory
Jump to