Information security experts reported the finding of a critical vulnerability in the desktop version of ownCloud, a software solution that enables online storage and maintenance of online applications. According to the report, successful exploitation of this flaw would allow arbitrary code running on the victims’ system.
Below is a detailed report of the reported flaw, in addition to your CVE identification key and your severity score according to the Common Vulnerability Scoring System (CVSS).
Tracked as CVE-2020-28646, this flaw exists because the application loads DLL libraries insecurely, so a remote malicious hacker could place a specially designed .dll file on a remote SMB file share, trick the victim into opening a file associated with the vulnerable application and thus get arbitrary code execution.
The flaw is considered critical by the information security community, so it received a score of 8.8/10 on the CVSS scale.
According to the report, the flaw lies in the following versions of ownCloud for desktops: 1.8.3, 1.8.3-rc3, 1.8.4, 2.0.0, 2.0.0-beta1, 2.0.0-beta2, 2.0.0-rc1, 2.0.0-rc2, 2.0.1, 2.0.2, 2.0.2-beta1, 2.0.2-oem, 2.0.2-rc1, 2.0.2-rc2, 2.1.0, 2.1.0-beta1, 2.1.0-rc1, 2.1.1, 2.1. 1-beta1, 2.1.1-rc1, 2.1.1-rc2, 2.2.0, 2.2.0-beta1, 2.2.0-beta2, 2.2.0-rc1, 2.2.1, 2.2.1-rc1, 2.2.2, 2.2.3, 2.2.3-beta1, 2.2.3-rc1, 2.2.4, 2.3.0, 2.3.0-beta1, 2.3.0-rc1, 2.3.0-rc2, 2.3.0-rc3, 2.3.1, 2.3.1-rc1, 2.3.2, 2.3.2-rc1, 2.3.3, 2.3.3-rc1, 2.3.4, 2.4.0, 2.4.0-alpha1, 2.4.0-beta1, 2.4.0-rc1, 2.4.0-rc2, 2.4.1 2.4.1-rc1, 2.4.2, 2.4.2-rc1, 2.4.3, 2.4.3-oem, 2.4.3-rc1, 2.5.0, 2.5.0-alpha, 2.5.0-alpha1, 2.5.0-beta1, 2.5.0-beta2, 2.5.0-oem, 2.5.0-rc1, 2.5.1, 2.5.1-rc2, 2.5.2, 2.5.2-rc2, 2.5.3, 2.5.4, 2.5.4-rc1, 2.6.0, 2.6.0-alpha1, 2.6.0-alpha2, 2.6.0-beta1, 2.6.0-rc1, 2.6.0-rc2, 2.6.0-rc4, 2.6.1, 2.6.2 and 2.6.3.
While this flaw can be exploited by unauthenticated remote threat actors over the local network, information security experts have not detected active exploit attempts or malware variants associated with the attack.
Security patches are now available, so users in affected deployments are advised to update as soon as possible. To learn more about information security risks, malware, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) website.