Published on: 27 November 2023
ownCloud released the security advisories to address multiple vulnerabilities in ownCloud core, graphapi and oauth2 libraries. For information about the vulnerabilities and the attacking vectors, please refer to the corresponding security advisories at the vendor's website.
Reports indicate that a vulnerability (CVE-2023-49103) in ownCloud graphapi library is at high risk of exploitation. A remote attacker could exploit the vulnerability to gather configuration details of the web server and other sensitive data such as admin password, mail server credentials and license key by sending specially crafted HTTP requests to an affected system. As patches have yet been available, system administrators are advised to take immediate actions to apply the latest workaround recommended by ownCloud.
For detailed information of the affected products, please refer to the section "Affected" of corresponding security advisories at vendor's website.
Depending on the vulnerabilities being exploited, a successful exploitation could lead to information disclosure, security restriction bypass, spoofing or tampering of affected system.
Patches for the affected systems are not yet available. In addition, please note that the vulnerability CVE-2023-49103 cannot be mitigated by simply disabling the ownCloud graphapi library. Administrators of affected systems should follow the workarounds provided by the product vendor and take immediate actions to mitigate the risks:
For affected versions of ownCloud core library in use:
For affected versions of ownCloud graphapi library in use:
For affected versions of ownCloud oauth2 library in use:
It is recommended to properly assess the impact before adopting the workaround and consult the product vendors for the assistance.