7.5
CVSSv3

CVE-2023-49103

Published: 21/11/2023 Updated: 05/12/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An issue exists in ownCloud owncloud/graphapi 0.2.x prior to 0.2.1 and 0.3.x prior to 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an malicious user to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

owncloud graph api 0.3.0

owncloud graph api 0.2.0

Vendor Advisories

Check Point Reference: CPAI-2023-1270 Date Published: 10 Dec 2023 Severity: High ...

Github Repositories

CVE-2023-49103 scanner for shodan.io downloaded json files

Small script to analyze shodan json downloads regarding CVE-2023-49103 This is a very naive and fast written skript If you already got a list of domains maybe try githubcom/creacitysec/CVE-2023-49103 instead First param is the json file second param ist the output file There are often some false positives but all accepted requests will be written as the domain + pa

PoC for the CVE-2023-49103

CVE-2023-49103 PoC for the CVE-2023-49103 Overview This Python script is designed to efficiently process a large list of URLs to check for the presence of phpinfo() output It uses multi-threading to handle a large number of URLs concurrently, significantly speeding up the process The script also features a real-time progress bar to visually track the progress To trigger the

OwnCloud CVE-2023-49103

To build the container do: 1: Down the folder, unzip and build the container 2: docker build -t cve-2023-49103 / 3: docker run --name cve-2023-49103 -p 80:80 -p 443:443 cve-2023-49103

Recent Articles

Trio of major holes in ownCloud expose admin passwords, allow unauthenticated file mods
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Mitigations require mix of updating libraries and manual customer action

ownCloud has disclosed three critical vulnerabilities, the most serious of which leads to sensitive data exposure and carries a maximum severity score. The open source file-sharing software company said containerized deployments of ownCloud could expose admin passwords, mail server credentials, and license keys. Tracked as CVE-2023-49103, the vulnerability carries a maximum severity rating of 10 on the CVSS v3 scale and affects the garaphapi app version 0.2.0 to 0.3.0.  The app relies on a ...