Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-49105Improper Authentication in Server

Severity
9.8CRITICALNVD
EPSS
89.6%
top 0.44%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 21
Latest updateDec 7

Description

An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDowncloud/owncloud_server10.6.010.13.1

🔴Vulnerability Details

2
GHSA
GHSA-585g-f852-v6p4: An issue was discovered in ownCloud owncloud/core before 102023-11-22
CVEList
CVE-2023-49105: An issue was discovered in ownCloud owncloud/core before 102023-11-21

💥Exploits & PoCs

1
Nuclei
OwnCloud - WebDAV API Authentication Bypass

🔍Detection Rules

2
Suricata
ET EXPLOIT Successful ownCloud Remote Improper Authentication Attempt (CVE-2023-49105)2023-12-07
Suricata
ET EXPLOIT ownCloud Remote Improper Authentication Attempt (CVE-2023-49105)2023-12-07
CVE-2023-49105 — Improper Authentication in Server | cvebase