Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/nextcloud.com.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLukas Reschke <lukas@statuscode.ch>2016-11-07 13:08:52 +0300
committerLukas Reschke <lukas@statuscode.ch>2016-11-07 13:08:52 +0300
commit3ced84ed23b68315eb0d3a145dafe5f0a32668c8 (patch)
tree6c51779539cc0bda33bbc56144e5204230116d58 /advisories
parent8f017d249f4d2b827cf3208c8b7813c18ca0b51c (diff)
Update advisories
Diffstat (limited to 'advisories')
-rw-r--r--advisories/.DS_Storebin6148 -> 6148 bytes
-rw-r--r--advisories/advisories.rss4
-rw-r--r--advisories/advisory-side.php2
-rw-r--r--advisories/nc-sa-2016-010.php2
-rw-r--r--advisories/nc-sa-2016-011.php2
-rw-r--r--advisories/server-list-part.php2
6 files changed, 6 insertions, 6 deletions
diff --git a/advisories/.DS_Store b/advisories/.DS_Store
index 5ebd6e48..5008ddfc 100644
--- a/advisories/.DS_Store
+++ b/advisories/.DS_Store
Binary files differ
diff --git a/advisories/advisories.rss b/advisories/advisories.rss
index a19d3292..18f8d551 100644
--- a/advisories/advisories.rss
+++ b/advisories/advisories.rss
@@ -17,7 +17,7 @@
<guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2016-010</guid>
<pubDate>Mon, 10 Oct 2016 13:21:06 +0200</pubDate>
</item><item>
- <title>Server: Stored XSS in Gallery application (nC-SA-2016-009)</title>
+ <title>Server: Reflected XSS in Gallery application (nC-SA-2016-009)</title>
<description>&lt;p&gt;The gallery app was not properly sanitizing exception messages from the Nextcloud server. Due to an endpoint where an attacker could influence the error message this lead to a reflected Cross-Site-Scripting vulnerability.&lt;/p&gt;&lt;br/&gt;&lt;hr/&gt;&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://nextcloud.com/security/advisory/?id=nC-SA-2016-009&quot;&gt;For more information please consult the official advisory.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;</description>
<link>https://nextcloud.com/security/advisory/?id=nC-SA-2016-009</link>
<guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2016-009</guid>
@@ -36,7 +36,7 @@
<pubDate>Mon, 10 Oct 2016 13:21:06 +0200</pubDate>
</item><item>
<title>Server: SMB User Authentication Bypass (nC-SA-2016-006)</title>
- <description>&lt;p&gt;Nextcloud includes an optional and not by default enabled SMB authentication component that allows to authenticate users against an SMB server.&lt;/p&gt;&lt;p&gt;This backend is implemented in a way that it tries to connect to a SMB server and if that succeeded consider the user logged-in.&lt;/p&gt;&lt;p&gt;The backend did not properly take into account SMB servers that any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The SMB backend is disabled by default and requires manual configuration in the Nextcloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability.&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;a href=&quot;https://rhinosecuritylabs.com/2016/08/operation-ownedcloud-exploitation-post-exploitation-persistence&quot;&gt;The reporter has published a blog post about this issue on their website as well.&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;br/&gt;&lt;hr/&gt;&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://nextcloud.com/security/advisory/?id=nC-SA-2016-006&quot;&gt;For more information please consult the official advisory.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;</description>
+ <description>&lt;p&gt;Nextcloud includes an optional and not by default enabled SMB authentication component that allows to authenticate users against an SMB server.&lt;/p&gt;&lt;p&gt;This backend is implemented in a way that it tries to connect to a SMB server and if that succeeded consider the user logged-in.&lt;/p&gt;&lt;p&gt;The backend did not properly take into account SMB servers that any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The SMB backend is disabled by default and requires manual configuration in the Nextcloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability.&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;a href=&quot;https://rhinosecuritylabs.com/2016/10/operation-ownedcloud-exploitation-post-exploitation-persistence/&quot;&gt;The reporter has published a blog post about this issue on their website as well.&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;br/&gt;&lt;hr/&gt;&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://nextcloud.com/security/advisory/?id=nC-SA-2016-006&quot;&gt;For more information please consult the official advisory.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;</description>
<link>https://nextcloud.com/security/advisory/?id=nC-SA-2016-006</link>
<guid isPermaLink="true">https://nextcloud.com/security/advisory/?id=nC-SA-2016-006</guid>
<pubDate>Mon, 10 Oct 2016 13:21:06 +0200</pubDate>
diff --git a/advisories/advisory-side.php b/advisories/advisory-side.php
index 3dee8087..7fd0e0b7 100644
--- a/advisories/advisory-side.php
+++ b/advisories/advisory-side.php
@@ -1,6 +1,6 @@
<br/><p>Nextcloud server 10.0.1</p>
<a href="/security/advisory/?id=nc-sa-2016-006">SMB User Authentication Bypass</a><br/>
<a href="/security/advisory/?id=nc-sa-2016-008">Stored XSS in CardDAV image export</a><br/>
-<a href="/security/advisory/?id=nc-sa-2016-009">Stored XSS in Gallery application</a><br/>
+<a href="/security/advisory/?id=nc-sa-2016-009">Reflected XSS in Gallery application</a><br/>
<a href="/security/advisory/?id=nc-sa-2016-010">Content-Spoofing in "files" app</a><br/>
<a href="/security/advisory/?id=nc-sa-2016-011">Content-Spoofing in "dav" app</a><br/>
diff --git a/advisories/nc-sa-2016-010.php b/advisories/nc-sa-2016-010.php
index 2b34aabf..41266b17 100644
--- a/advisories/nc-sa-2016-010.php
+++ b/advisories/nc-sa-2016-010.php
@@ -40,7 +40,7 @@
<h3>Acknowledgements</h3>
<p>The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:</p>
<ul>
- <li>lmx - Vulnerability discovery and disclosure.</li>
+ <li><a href="https://hackerone.com/lmx" target="_blank" rel="noreferrer">lmx - Vulnerability discovery and disclosure.</a></li>
</ul>
<br/>
<small style="color:grey">This advisory is licensed <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</small>
diff --git a/advisories/nc-sa-2016-011.php b/advisories/nc-sa-2016-011.php
index a0071b73..c5c4e8a0 100644
--- a/advisories/nc-sa-2016-011.php
+++ b/advisories/nc-sa-2016-011.php
@@ -36,7 +36,7 @@
<h3>Acknowledgements</h3>
<p>The Nextcloud team thanks the following people for their research and responsible disclosure of the above advisory:</p>
<ul>
- <li><a href="https://twitter.com/YoKoAcc">YoKo Kho (MII CAS) - Vulnerability discovery and disclosure.</a></li>
+ <li><a href="https://twitter.com/YoKoAcc" target="_blank" rel="noreferrer">YoKo Kho - MII CAS - Vulnerability discovery and disclosure.</a></li>
</ul>
<br/>
<small style="color:grey">This advisory is licensed <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</small>
diff --git a/advisories/server-list-part.php b/advisories/server-list-part.php
index ec6c1cc8..4c2af4c5 100644
--- a/advisories/server-list-part.php
+++ b/advisories/server-list-part.php
@@ -1,7 +1,7 @@
<p>Version 10.0.1</p>
<a href="/security/advisory/?id=nc-sa-2016-006">SMB User Authentication Bypass</a><br>
<a href="/security/advisory/?id=nc-sa-2016-008">Stored XSS in CardDAV image export</a><br>
-<a href="/security/advisory/?id=nc-sa-2016-009">Stored XSS in Gallery application</a><br>
+<a href="/security/advisory/?id=nc-sa-2016-009">Reflected XSS in Gallery application</a><br>
<a href="/security/advisory/?id=nc-sa-2016-010">Content-Spoofing in "files" app</a><br>
<a href="/security/advisory/?id=nc-sa-2016-011">Content-Spoofing in "dav" app</a><br>
<br/><p>Version 10.0.0</p>