CVE-2023-49105

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49105
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-49105.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-49105
Published
2023-11-21T22:15:08.613Z
Modified
2025-11-15T07:01:14.015053Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.

References

Affected packages

Git / github.com/owncloud/core

Affected ranges

Type
GIT
Repo
https://github.com/owncloud/core
Events

Affected versions

v10.*

v10.10.0
v10.10.0RC1
v10.10.0RC2
v10.10.0RC3
v10.11.0
v10.11.0-beta.1
v10.11.0-rc.1
v10.11.0-rc.2
v10.11.0-rc.3
v10.13.1-rc.1
v10.13.1-rc.2
v10.6.0
v10.7.0
v10.7.0RC1
v10.7.0RC2
v10.7.0beta2
v10.8.0
v10.8.0RC1
v10.8.0beta2
v10.9.0
v10.9.0RC1
v10.9.0RC2
v10.9.0beta1