6.8

CVE-2013-0299

Multiple cross-site request forgery (CSRF) vulnerabilities in ownCloud before 4.0.12 and 4.5.x before 4.5.7 allow remote attackers to hijack the authentication of users for requests that (1) change the timezone for the user via the lat and lng parameters to apps/calendar/ajax/settings/guesstimezone.php, (2) disable or enable the automatic timezone detection via the timezonedetection parameter to apps/calendar/ajax/settings/timezonedetection.php, (3) import user accounts via the admin_export parameter to apps/admin_migrate/settings.php, (4) overwrite user files via the operation parameter to apps/user_migrate/ajax/export.php, or (5) change the authentication server URL via unspecified vectors to apps/user_ldap/settings.php.

Data is provided by the National Vulnerability Database (NVD)
OwncloudOwncloud Version <= 4.0.11
OwncloudOwncloud Server Version3.0.0
OwncloudOwncloud Server Version3.0.1
OwncloudOwncloud Server Version3.0.2
OwncloudOwncloud Server Version3.0.3
OwncloudOwncloud Server Version4.0.0
OwncloudOwncloud Server Version4.0.1
OwncloudOwncloud Server Version4.0.2
OwncloudOwncloud Server Version4.0.3
OwncloudOwncloud Server Version4.0.4
OwncloudOwncloud Server Version4.0.5
OwncloudOwncloud Server Version4.0.6
OwncloudOwncloud Server Version4.0.7
OwncloudOwncloud Server Version4.0.8
OwncloudOwncloud Server Version4.0.9
OwncloudOwncloud Server Version4.0.10
OwncloudOwncloud Server Version4.5.0
OwncloudOwncloud Server Version4.5.1
OwncloudOwncloud Server Version4.5.2
OwncloudOwncloud Server Version4.5.3
OwncloudOwncloud Server Version4.5.4
OwncloudOwncloud Server Version4.5.5
OwncloudOwncloud Server Version4.5.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.12% 0.275
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.