OwnCloud Server 10.0 User Enumeration

2018.01.31
Credit: n4xh4ck5
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Class User Enumeration CVE Remote Yes Credit n4xh4ck5 Home https://github.com/n4xh4ck5 Vulnerable Owncloud Server 8.1 to 10.0 Once time authenticated in the application, the Owncloud funcionality let to User enumeration due the different error messages of the server. The vulnerabiblity it finds in Owncloud Server 8.1 to 10.0. In the next steps it describes the PoC to show the vulnerability: - Go to the user settings. - Analyzing the traffic, it can be appreciated the next URL (In this case I used to demo.owcloud.org such as target trought Bug Bounty program Hacker One): https://demo.owncloud.org/index.php/avatar/demo/1 The server responds: "{"data"}: ("displayname":"demo")} So, if it changes in the URL the value "demo" by another: For example, by a valid user such as admin: https://demo.owncloud.org/index.php/avatar/admin/1 The server responds: "{"data"}: ("displayname":"admin")} but it changes by a user not valid such as "noexiste": https://demo.owncloud.org/index.php/avatar/noexiste/1 the server responds: "{"data"}: ("displayname":"")} The server responds differently depending on the legitimacy of the user, it is possible to enumerate users. Kind regards. Thanks for you job.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top