CVE-2014-2044
Published Oct 6, 2014
Last updated 6 years ago
Overview
- Description
- Incomplete blacklist vulnerability in ajax/upload.php in ownCloud before 5.0, when running on Windows, allows remote authenticated users to bypass intended access restrictions, upload files with arbitrary names, and execute arbitrary code via an Alternate Data Stream (ADS) syntax in the filename parameter, as demonstrated using .htaccess::$DATA to upload a PHP program.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E00A66E-D01C-4452-9191-CC9E2FC4FDB9", "versionEndIncluding": "4.5.13" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A1021FF-2A5A-49AA-A376-09C98FECC519" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F6C12F7-5897-4DBB-A9AB-8180101F37C3" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9CC055C-CFA3-4A23-AF91-83F7F087F282" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA5445B4-9115-4D31-9DF9-E7E30CAF1FFD" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FAE7D90-6190-44E2-B4EA-F47FF3263BE6" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7BAB402-B6A0-4314-A37A-C9465157BF5E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A32BED8-F428-44D3-BEAC-E0BB0208B6B6" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F46F53A9-52B2-41D6-859B-9062B1F02B86" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "875B306F-92A2-4360-979E-2B53466A33F0" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EB01EA3-3071-424F-9586-83CD208D5CAE" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A704201-6D06-4D01-9A28-3D873ABE1AC7" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1D5E8BD-2264-482E-ABA9-F83D2A13EF88" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6C88496-C383-4C6B-ABCC-362EF6C6DC0B" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3F1BD85-6443-438C-9490-C39BD6970F00" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "786C0B60-FFF9-4B54-91AD-C8A177FF7D5F" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4011972-8C9A-47DA-B7E1-BC1951AEC51A" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59C62AA4-A398-4D20-B0D4-18437027AE1B" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74FD954F-460F-42F0-A8B2-EC46710E3C53" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA0C079E-48B7-4266-A343-D555C0ECD611" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B48E86B-7685-4EB0-9172-492842DEEE9A" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A670DD33-A604-4BD4-8235-4500B05F518E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B362D262-CB7A-4987-AD26-406E20DE9BCD" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC3B9287-AC9F-488B-A6F4-1AC822BBBAE4" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF01655F-80A2-4A6B-9F30-18E39581F971" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E08AB56D-506A-4D31-AD83-12A5937393B4" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99D723BA-E386-456D-8BC3-91390798B4B4" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75538474-59FA-444C-865C-7B401A491476" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9852A84C-BAA9-43E7-BD30-D6F5D752502E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC86F25A-605B-4B1C-8E5A-8022CC59619F" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C77250D-017E-4907-923E-127227EB68CC" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1583C4C-6501-48ED-BF31-AFCF38C5D59F" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C04C004-0238-424A-8364-9ED780850DC6" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79736879-F5A3-4769-862F-531BDDC946B1" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:4.5.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E1754FC-6F84-43F0-89E0-596A05B6E42D" } ], "operator": "OR" } ] } ]