{"id":23465,"date":"2023-11-28T03:10:09","date_gmt":"2023-11-28T11:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/28\/news-17195\/"},"modified":"2023-11-28T03:10:09","modified_gmt":"2023-11-28T11:10:09","slug":"news-17195","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/28\/news-17195\/","title":{"rendered":"ownCloud vulnerability can be used to extract admin passwords"},"content":{"rendered":"\n<p>ownCloud has <a href=\"https:\/\/owncloud.com\/security\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warned users about three critical security flaws<\/a> in its file-sharing software which, if exploited, could reveal sensitive information and modify files. An especially and potentially impactful one is a vulnerability that could lead <a href=\"https:\/\/owncloud.com\/security-advisories\/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">to disclosure of sensitive credentials and configuration in containerized deployments<\/a>.<\/p>\n<p>ownCloud is a very widely used open-source project that allows users to host and sync files. <a href=\"https:\/\/owncloud.com\/about-us\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ownCloud <\/a>says on its own website that it has 200 million users, including 600 enterprises.<\/p>\n<p>The vulnerabilities stem from one of the building blocks of the project.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;The graphapi app relies on a third-party library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo).&#8221;<\/p>\n<\/blockquote>\n<p>Microsoft\u2019s Graph API (graphapi) is a web API that enables you to access Microsoft Cloud service resources. After you register your app and get authentication tokens for a user or service, you can make requests to the Microsoft Graph API.<\/p>\n<p>A Shodan search shows many thousands of exposed services, especially in Germany and the US.<\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"932\" height=\"1041\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Shodown.png?w=917\" alt=\"Shodan search results for ownCloud showing over 21,000 exposed instances\" class=\"wp-image-99187\" style=\"width:700px\" \/><\/figure>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVEs of the found vulnerabilities are:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-49105\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-49105<\/a> (<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> 9.8 out of 10): An issue was discovered in ownCloud <em>owncloud\/core<\/em> before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-49104\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-49104<\/a> (CVSS score 9 out of 10): An issue was discovered in ownCloud <em>owncloud\/oauth2<\/em> before 0.6.1, when Allow Subdomains is enabled. An attacker is able to pass in a crafted redirect-url that bypasses validation, and consequently allows an attacker to redirect callbacks to a Top Level Domain (TLD) controlled by the attacker.<\/p>\n<p>Redirect URLs are a critical part of the OAuth (authentication) flow. After a user successfully authorizes an application, the authorization server will redirect the user back to the application. Because the redirect URL will contain sensitive information, it is critical that the service doesn\u2019t redirect the user to arbitrary locations.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-49103\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-49103<\/a> (CVSS score 10 out of 10): An issue was discovered in ownCloud owncloud\/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When you acess this URL, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Additionally, <em>phpinfo<\/em> exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. A working <a href=\"https:\/\/github.com\/creacitysec\/CVE-2023-49103\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Proof of Concept (PoC) for this vulnerability<\/a> is already available on GitHub<\/p>\n<p>Ransomware operators could have a field day with this vulnerability. As they have shown in the past, they love file-sharing apps almost as much as they love admin passwords. It allows them to roam free in your network and move the stolen data to a location under their control at your expense.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-what-to-do\">What to do<\/h2>\n<p>ownCloud says you should delete the file <em>owncloud\/apps\/graphapi\/vendor\/microsoft\/microsoft-graph\/tests\/GetPhpInfo.php<\/em>. Simply disabling the graphapi app won&#8217;t eliminate the vulnerability.<\/p>\n<p>In newer versions, ownCloud has disabled the <em>phpinfo<\/em> function in the docker-containers, promising to apply various hardenings in future core releases to mitigate similar vulnerabilities.<\/p>\n<p>Then change the following:<\/p>\n<ul>\n<li>Your ownCloud admin password<\/li>\n<li>The mail server credentials<\/li>\n<li>Database credentials<\/li>\n<li>Object-Store\/S3 access-key<\/li>\n<\/ul>\n<p>Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.<\/p>\n<p>If you are unable to patch right now you can disable the \u201cAllow Subdomains\u201d option to disable the vulnerability as a workaround for CVE-2023-49104.<\/p>\n<p>As a workaround for CVE-2023-49105, you can configure the signing-key.<\/p>\n<p>Instructions on how to update ownCloud can be found on its <a href=\"https:\/\/doc.owncloud.com\/server\/next\/admin_manual\/appliance\/maintenance\/howto-update-owncloud.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">website<\/a>.<\/p>\n<hr class=\"wp-block-separator alignfull has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>Black Friday sale<\/strong><\/p>\n<p>Save 50% on our Home bundles for a limited time only!<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-cd031d84-f7c2-4fbe-94fa-48e04a740a8c\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/pricing?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_bfcmsocial_169929618190&amp;utm_content=V1\">CHECK OUT DEALS<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/11\/owncloud-vulnerability-can-be-used-to-extract-admin-passwords\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A vulnerability in the ownCloud file sharing app could lead to the exposure of sensitive credentials like admin passwords. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30542,30543,30544,22783,32,30545],"class_list":["post-23465","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2023-49103","tag-cve-2023-49104","tag-cve-2023-49105","tag-exploits-and-vulnerabilities","tag-news","tag-owncloud"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23465"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23465\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23465"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}