2024-11-23 01:05:45 +00:00

163 lines
5.6 KiB
JSON

{
"id": "CVE-2015-6670",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-10-26T14:59:09.577",
"lastModified": "2024-11-21T02:35:24.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "ownCloud Server before 7.0.8, 8.0.x before 8.0.6, and 8.1.x before 8.1.1 does not properly check ownership of calendars, which allows remote authenticated users to read arbitrary calendars via the calid parameter to apps/calendar/export.php."
},
{
"lang": "es",
"value": "ownCloud Server en versiones anteriores a 7.0.8, 8.0.x en versiones anteriores a 8.0.6 y 8.1.x en versiones anteriores a 8.1.1 no verifica adecuadamente el propietario de los calendarios, lo que permite a usuarios remotos autenticados leer calendarios arbitrariamente a trav\u00e9s del par\u00e1metro calid en apps/calendar/export.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1941F4-D2B5-4633-A934-FBD126B72D1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22EBDD6A-804F-44E8-A516-61760B5D447B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF6F676-1C9E-4F33-8E91-BC41E42CEE57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF3DCFD-3264-4315-947E-0D2725E3BFEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C26782F8-FE62-4B2D-B0C9-81EFFE395D6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E5945851-35B8-4509-92C7-CF706C794266"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F58319-DE37-4307-9D60-BDFC27D6826B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD03A74-6F1D-43EC-BC93-F2AF2467F6D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C45645-3A99-4E08-952A-EEBFE35AC70E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD0FA9-F12F-46A2-90F4-B48310A7ED0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5C18316B-E0DF-4693-AD3A-8C923965931B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "66A3C5DA-52BA-4B86-A7A1-BEAE730E80E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "453D8D0E-B385-4A8F-9D01-CDE38E6C1D4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:owncloud:owncloud:8.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "644C5331-A967-497D-A7ED-919F5988C8E8"
}
]
}
]
}
],
"references": [
{
"url": "http://www.debian.org/security/2015/dsa-3373",
"source": "cve@mitre.org"
},
{
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-015",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2015/dsa-3373",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-015",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
],
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/639.html\">CWE-639: Authorization Bypass Through User-Controlled Key</a>"
}