Vulnerability Description
Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nextcloud | Nextcloud Server | < 9.0.54 |
| Owncloud | Owncloud | >= 9.0.0, < 9.0.6 |
Related Weaknesses (CWE)
References
- https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659aeIssue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359eaIssue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee309Issue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716Issue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619bIssue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a1Issue TrackingPatchThird Party Advisory
- https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2dIssue TrackingPatchThird Party Advisory
- https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4Issue TrackingPatchThird Party Advisory
- https://hackerone.com/reports/154827ExploitThird Party Advisory
- https://nextcloud.com/security/advisory/?id=nc-sa-2016-010PatchVendor Advisory
- https://owncloud.org/security/advisory/?id=oc-sa-2016-020PatchVendor Advisory
- https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659aeIssue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359eaIssue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee309Issue TrackingPatchThird Party Advisory
- https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2016-9467?
CVE-2016-9467 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed paramet...
How severe is CVE-2016-9467?
CVE-2016-9467 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9467?
Check the references section above for vendor advisories and patch information. Affected products include: Nextcloud Nextcloud Server, Owncloud Owncloud.