### [CVE-2023-49105](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49105) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ambionics/owncloud-exploits - https://github.com/nomi-sec/PoC-in-GitHub