|
Message-ID: <CAD1Nwhh+XYimdxznSTt4JD7ah4ZP5Vw1fQ8EEG-2NbBOXw4F0Q@mail.gmail.com> Date: Sun, 21 Apr 2013 14:13:44 +0200 From: Lukas Reschke <lukas@...cloud.org> To: Open Source Security <oss-security@...ts.openwall.com>, announcements@...cloud.org, "owncloud@....org Mailinglist" <owncloud@....org>, "packaging@...cloud.org Packaging" <packaging@...cloud.org> Subject: ownCloud Security Advisories (2013-017, 2013-018) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This vulnerabilities only affect ownCloud Server 5.0.x and 4.5.x, the 4.0.x branch is not affected and still supported with security updates by us. --------------------------------------- # XSS vulnerability in MediaElement.js (oC-SA-2013-017) Web: https://owncloud.org/about/security/advisories/oC-SA-2013-017/ ## CVE IDENTIFIERS - CVE-2013-1967 (MediaElement.js) ## AFFECTED SOFTWARE - ownCloud Server < 5.0.5 - ownCloud Server < 4.5.10 ## RISK - High ## COMMITS - b13c31b (stable5) - 239ec01 (stable45) ## DESCRIPTION A cross-site scripting (XSS) vulnerability in all ownCloud versions prior to 5.0.5 and 4.5.10 except the 4.0.x branch allows remote attackers to execute arbitrary javascript when a user opens a special crafted URL. This vulnerability exists in the bundled 3rdparty plugin “MediaElement.js”, “MediaElement.js” released version 2.11.2 which addresses the problem. ## CREDITS The ownCloud Team would like to thank Malte Batram (batr.am) for discovering this vulnerability and responsibly disclosing this to us and upstream. ## RESOLUTION Update to ownCloud Server 5.0.5 or 4.5.10 http://download.owncloud.org/community/owncloud-5.0.5.tar.bz2 http://download.owncloud.org/community/owncloud-4.5.10.tar.bz2 --------------------------------------- # Privilege escalation in the contacts application (oC-SA-2013-018) Web: https://owncloud.org/about/security/advisories/oC-SA-2013-018/ ## CVE IDENTIFIERS - CVE-2013-1963 ## AFFECTED SOFTWARE - ownCloud Server < 5.0.5 - ownCloud Server < 4.5.10 ## RISK - High ## COMMITS - 9cc35e4 (stable5) - fc4632d (stable45) ## DESCRIPTION Due to not properly checking the ownership of a single contact, an authenticated attacker is able to download contacts of other users in all ownCloud versions prior to 5.0.5 including the 4.5.x branch. Note: Successful exploitation of this privilege escalation requires the “contacts” app to be enabled (enabled by default). ## RESOLUTION Update to ownCloud Server 5.0.5 ir 4.5.10 http://download.owncloud.org/community/owncloud-5.0.5.tar.bz2 http://download.owncloud.org/community/owncloud-4.5.10.tar.bz2 -- ownCloud Your Cloud, Your Data, Your Way! GPG: 0xEB32B77BA406BE99 -----BEGIN PGP SIGNATURE----- wsFcBAEBAgAQBQJRc9e8CRDrMrd7pAa+mQAAcSUP/3tkGnef8/xIgZSLECVK tDmVK3bLEkty/CVKh6hKkQ4ub8tU0F6+AICdWd2zFuwQkIlVR3l8yMyvEn9a lwmv9c7ZMH7/n0TBNcZY16MDWIx9Rz21vLR0bebetNbv2fsT9qr6BA8lqlXf +iuwPvjyS7jzk7grBdGkUiMiD75+uw4K4lQ7Q8Bo1MMv2HEcocy1ed54lRyO oc0JAVwv52MVei1OJ4j/DvioskbkXE+fE51BohA2cq49MFnMppOBMt1AUsDO 3haKXGBI0rvEmuHzFO+9CnSPjcef6qydxOUlCz7zYx1UNwUqJZSVL0xtqsly AcHzGwxn589SLRSaWUXR0Vq9Z5d9trlx7CG8QsGUMvA/wuqvjnOBb4bx+0lG OxmM7jbbxS6K0Xnn18vLqAnkEX+lwXSJC1QQrGezFOD5wLINJilLaxOrNYHH kEG9OZUjNpqT/FvNJv4J8x11IF+7T8Qi0lBrHDQJMyUMqsaackpK9DEB2MQZ NZTWrwo5OBlYsxFkpgeP/na2pbyndUqL6//J3e0DijjiitzakpjX4fFURiln sac2TWwtlkuUJcXllHpn+3Kz17ARP6f7hCcgz7Pf1Ci7TaU1kBh/3wDdn9/x HNPg7PPxZrsi9yiaui8vMKZUSCnEZTKhGAjn6Rjbp0I0tX+P9GY4gI8K9wO8 DhLV =/xQd -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.