{ "id": "CVE-2014-2053", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:03.840", "lastModified": "2017-01-07T02:59:45.173", "vulnStatus": "Modified", "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/611.html\n\n\"CWE-611: Improper Restriction of XML External Entity Reference ('XXE')\"", "descriptions": [ { "lang": "en", "value": "getID3() before 1.9.8, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack." }, { "lang": "es", "value": "getID3() anterior a 1.9.8, utilizado en ownCloud Server anterior a 5.0.15 y 6.0.x anterior a 6.0.2, permite a atacantes remotos leer archivos arbitrarios, causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de un ataque de entidad externa XML (XXE)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.9.7", "matchCriteriaId": "CAE8C089-AD55-44B6-A339-A2C9704B553E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DD1A9EF-8E36-4DC2-B8C8-F53DF1E67021" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "082C4DC6-92ED-4F5C-A1C3-33ED05D35777" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4D9D3F2-6E2B-43AC-A110-8A2161CA3ABA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C1372B8-0C2F-4545-943D-21D8BF2A6246" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.4:b1:*:*:*:*:*:*", "matchCriteriaId": "6F4BE5F7-0CE4-4116-B069-3FD741E81428" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "BB5BCC7F-62B5-4C6F-B8C9-8E1AF03C8F8F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFFAC3A-8848-4E63-812B-F69D213748D0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:*:a:*:*:*:*:*:*", "versionEndIncluding": "5.0.14", "matchCriteriaId": "CF8A525D-F052-449B-AFD8-DC6A956D30D9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF826F2B-83E1-4E64-A56C-B564028EBD6A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "22A19441-2041-45DC-9F59-783C9B1FF9D5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "43448288-B129-4210-9680-55836869F09F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "78639CDB-3763-4E71-B4F9-E51E5A261A16" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8DBE1CE3-7A8D-4C97-8066-F59C346A0494" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0F97DF5D-DC0E-43FB-B0D2-4AA8C2A5413D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "55475558-53CA-4764-9A70-1355D5759CFA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "2DC3BCEC-9685-4899-91B6-1889FAB235C0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D4055273-FBA3-46A7-9B0B-0A5A8BB2E0AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "56985A58-4F38-4192-AEC3-7953184206E7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "D6510E0F-BA72-4591-8931-83974EFCDF0D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "14E553AC-B7F1-4692-8BC7-C59CE39C5CD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "3F1D79C4-2B24-4E55-8217-FDC00F22EC44" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "16960810-E5B8-45EC-A54D-55941B1E728A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "1DF9CAFD-F2E5-4AD4-BB65-D04A87E8E3B5" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.9.7", "matchCriteriaId": "CAE8C089-AD55-44B6-A339-A2C9704B553E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3DD1A9EF-8E36-4DC2-B8C8-F53DF1E67021" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "082C4DC6-92ED-4F5C-A1C3-33ED05D35777" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "A4D9D3F2-6E2B-43AC-A110-8A2161CA3ABA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C1372B8-0C2F-4545-943D-21D8BF2A6246" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.4:b1:*:*:*:*:*:*", "matchCriteriaId": "6F4BE5F7-0CE4-4116-B069-3FD741E81428" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "BB5BCC7F-62B5-4C6F-B8C9-8E1AF03C8F8F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:getid3:getid3:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CFFAC3A-8848-4E63-812B-F69D213748D0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A499C18-61F0-486C-99E5-F6DD74EE5521" }, { "vulnerable": true, "criteria": "cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "237F18EA-1A9B-4DE6-B604-12EB651F5F0F" } ] } ] } ], "references": [ { "url": "http://getid3.sourceforge.net/source/changelog.txt", "source": "cve@mitre.org" }, { "url": "http://owncloud.org/about/security/advisories/oC-SA-2014-006/", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/58002", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2014/dsa-3001", "source": "cve@mitre.org" }, { "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", "source": "cve@mitre.org" } ] }