mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
112 lines
4.9 KiB
JSON
112 lines
4.9 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "support@hackerone.com",
|
|
"ID": "CVE-2016-9467",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "User Interface (UI) Misrepresentation of Critical Information (CWE-451)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013"
|
|
},
|
|
{
|
|
"name": "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a"
|
|
},
|
|
{
|
|
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010",
|
|
"refsource": "MISC",
|
|
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010"
|
|
},
|
|
{
|
|
"name": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071"
|
|
},
|
|
{
|
|
"name": "https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d"
|
|
},
|
|
{
|
|
"name": "https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4"
|
|
},
|
|
{
|
|
"name": "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14"
|
|
},
|
|
{
|
|
"name": "https://hackerone.com/reports/154827",
|
|
"refsource": "MISC",
|
|
"url": "https://hackerone.com/reports/154827"
|
|
},
|
|
{
|
|
"name": "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960"
|
|
},
|
|
{
|
|
"name": "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1"
|
|
},
|
|
{
|
|
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2016-020",
|
|
"refsource": "MISC",
|
|
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2016-020"
|
|
}
|
|
]
|
|
}
|
|
} |