CVE-2014-2055CVE-2014-2055

Affected configuration(s):

cpe:/a:fruux:sabredav:1.6.0
cpe:/a:fruux:sabredav:1.6.1
cpe:/a:fruux:sabredav:1.6.2
cpe:/a:fruux:sabredav:1.6.3
cpe:/a:fruux:sabredav:1.6.4
cpe:/a:fruux:sabredav:1.6.5
cpe:/a:fruux:sabredav:1.6.6
cpe:/a:fruux:sabredav:1.6.7
cpe:/a:fruux:sabredav:1.6.8
cpe:/a:fruux:sabredav:1.6.9
cpe:/a:fruux:sabredav:1.6.10
cpe:/a:fruux:sabredav:1.7.0
cpe:/a:fruux:sabredav:1.7.1
cpe:/a:fruux:sabredav:1.7.2
cpe:/a:fruux:sabredav:1.7.3
cpe:/a:fruux:sabredav:1.7.4
cpe:/a:fruux:sabredav:1.7.5
cpe:/a:fruux:sabredav:1.7.6
cpe:/a:fruux:sabredav:1.7.7
cpe:/a:fruux:sabredav:1.7.8
cpe:/a:fruux:sabredav:1.7.9
cpe:/a:fruux:sabredav:1.7.10
cpe:/a:fruux:sabredav:1.8.0
cpe:/a:fruux:sabredav:1.8.1
cpe:/a:fruux:sabredav:1.8.2
cpe:/a:fruux:sabredav:1.8.3
cpe:/a:fruux:sabredav:1.8.4
cpe:/a:fruux:sabredav:1.8.5
cpe:/a:fruux:sabredav:1.8.6
cpe:/a:fruux:sabredav:1.8.7
cpe:/a:fruux:sabredav:1.8.9
cpe:/a:owncloud:owncloud:5.0.0
cpe:/a:owncloud:owncloud:5.0.1
cpe:/a:owncloud:owncloud:5.0.2
cpe:/a:owncloud:owncloud:5.0.3
cpe:/a:owncloud:owncloud:5.0.4
cpe:/a:owncloud:owncloud:5.0.5
cpe:/a:owncloud:owncloud:5.0.6
cpe:/a:owncloud:owncloud:5.0.7
cpe:/a:owncloud:owncloud:5.0.8
cpe:/a:owncloud:owncloud:5.0.9
cpe:/a:owncloud:owncloud:5.0.10
cpe:/a:owncloud:owncloud:5.0.11
cpe:/a:owncloud:owncloud:5.0.12
cpe:/a:owncloud:owncloud:5.0.13
cpe:/a:owncloud:owncloud:5.0.14
cpe:/a:owncloud:owncloud:5.0.14:a
cpe:/a:owncloud:owncloud:6.0.0
cpe:/a:owncloud:owncloud:6.0.1

Date published: 2014-06-04T10:55:04.047-04:00

Date last modified: 2014-06-04T14:38:42.047-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://owncloud.org/about/security/advisories/oC-SA-2014-006/

Summary: SabreDAV before 1.7.11, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.