CVE-2012-5609
Published Dec 18, 2012
Last updated 12 years ago
Overview
- Description
- Incomplete blacklist vulnerability in lib/migrate.php in ownCloud before 4.5.2 allows remote authenticated users to execute arbitrary PHP code by uploading a crafted mount.php file in a ZIP file.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21D91475-2CF5-4CA4-888E-44C1D4AC2701", "versionEndIncluding": "4.5.1" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A1021FF-2A5A-49AA-A376-09C98FECC519" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F6C12F7-5897-4DBB-A9AB-8180101F37C3" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9CC055C-CFA3-4A23-AF91-83F7F087F282" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA5445B4-9115-4D31-9DF9-E7E30CAF1FFD" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FAE7D90-6190-44E2-B4EA-F47FF3263BE6" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7BAB402-B6A0-4314-A37A-C9465157BF5E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A32BED8-F428-44D3-BEAC-E0BB0208B6B6" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F46F53A9-52B2-41D6-859B-9062B1F02B86" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "875B306F-92A2-4360-979E-2B53466A33F0" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EB01EA3-3071-424F-9586-83CD208D5CAE" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A704201-6D06-4D01-9A28-3D873ABE1AC7" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1D5E8BD-2264-482E-ABA9-F83D2A13EF88" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C88496-C383-4C6B-ABCC-362EF6C6DC0B" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3F1BD85-6443-438C-9490-C39BD6970F00" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B362D262-CB7A-4987-AD26-406E20DE9BCD" } ], "operator": "OR" } ] } ]