CVE-2016-1500
Published Jan 8, 2016
Last updated 9 years ago
Overview
- Description
- ownCloud Server before 7.0.12, 8.0.x before 8.0.10, 8.1.x before 8.1.5, and 8.2.x before 8.2.2, when the "file_versions" application is enabled, does not properly check the return value of getOwner, which allows remote authenticated users to read the files with names starting with ".v" and belonging to a sharing user by leveraging an incoming share.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 3.1
- Impact score
- 1.4
- Exploitability score
- 1.6
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- LOW
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9ED68463-3D2F-4227-8202-BE10AE025374", "versionEndIncluding": "7.0.11" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C45645-3A99-4E08-952A-EEBFE35AC70E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AFD0FA9-F12F-46A2-90F4-B48310A7ED0D" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C18316B-E0DF-4693-AD3A-8C923965931B" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66A3C5DA-52BA-4B86-A7A1-BEAE730E80E7" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "453D8D0E-B385-4A8F-9D01-CDE38E6C1D4B" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCE3AB7D-04F1-4F0B-BFFE-4260C8E13A36" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "259D042F-CB8A-434C-9923-E50E92F3129F" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2784965-324F-4455-97DC-7183DE7A4293" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "644C5331-A967-497D-A7ED-919F5988C8E8" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB456E3-CFF6-4378-9341-74B244DD042E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2439520-80AD-45E9-8551-2C0C7A2C6F3E" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC29D1D1-03EC-48B0-B917-F4E2C6FD3906" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49E9C5BC-A6BA-4919-9934-BFAA915CC042" }, { "criteria": "cpe:2.3:a:owncloud:owncloud:8.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34AF5397-3B98-431B-B235-424A3B6BEFAC" } ], "operator": "OR" } ] } ]