Vulnerability Details : CVE-2016-9468
Potential exploit
Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the dav app. The exception message displayed on the DAV endpoints contained partially user-controllable input leading to a potential misrepresentation of information.
Vulnerability category: BypassGain privilege
Products affected by CVE-2016-9468
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
- cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9468
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9468
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2016-9468
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
-
The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.Assigned by: support@hackerone.com (Secondary)
References for CVE-2016-9468
-
https://github.com/owncloud/core/commit/96b8afe48570bc70088ccd8f897e9d71997d336e
[stable9.1] Merge pull request #26460 from owncloud/throw-exceptions-… · owncloud/core@96b8afe · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://owncloud.org/security/advisory/?id=oc-sa-2016-021
Security Advisories – ownCloudPatch;Vendor Advisory
-
https://github.com/nextcloud/server/commit/7350e13113c8ed484727a5c25331ec11d4d59f5f
Don't print exception message in HTML · nextcloud/server@7350e13 · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://hackerone.com/reports/149798
#149798 Content (Text) Injection at NextCloud Server 9.0.52 - via http://custom_nextcloud_url/remote.php/dav/files/Exploit;Third Party Advisory
-
https://github.com/owncloud/core/commit/bcc6c39ad8c22a00323a114e9c1a0a834983fb35
Merge pull request #26460 from owncloud/throw-exceptions-not-printable · owncloud/core@bcc6c39 · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://nextcloud.com/security/advisory/?id=nc-sa-2016-011
advisory – NextcloudPatch;Vendor Advisory
-
https://github.com/nextcloud/server/commit/a4cfb3ddc1f4cdb585e05c0e9b2f8e52a0e2ee3e
Don't print exception message in HTML · nextcloud/server@a4cfb3d · GitHubIssue Tracking;Patch;Third Party Advisory
Jump to