The filename sanitization component in ownCloud Server before 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4 does not properly handle $_GET parameters cast by PHP to an array, which allows remote attackers to cause a denial of service (infinite loop and log file consumption) via crafted endpoint file names.
References
Configurations
Configuration 1 (hide)
|
History
31 Mar 2025, 11:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Owncloud owncloud Server
|
|
CPE | cpe:2.3:a:owncloud:owncloud:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud:7.0.0:*:*:*:*:*:*:* |
cpe:2.3:a:owncloud:owncloud_server:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:8.0.3:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:owncloud:owncloud_server:7.0.0:*:*:*:*:*:*:* |
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2015/dsa-3373 - | |
References | () http://www.securityfocus.com/bid/76161 - | |
References | () https://owncloud.org/security/advisory/?id=oc-sa-2015-007 - Vendor Advisory |
Information
Published : 2015-10-21 18:59
Updated : 2025-03-31 11:54
NVD link : CVE-2015-4717
Mitre link : CVE-2015-4717
CVE.ORG link : CVE-2015-4717
JSON object : View
Products Affected
owncloud
- owncloud
- owncloud_server
CWE
CWE-399
Resource Management Errors