Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f964-5xjr-pjjv

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The filename sanitization component in ownCloud Server before 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4 does not properly handle $_GET parameters cast by PHP to an array, which allows remote attackers to cause a denial of service (infinite loop and log file consumption) via crafted endpoint file names.

The filename sanitization component in ownCloud Server before 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4 does not properly handle $_GET parameters cast by PHP to an array, which allows remote attackers to cause a denial of service (infinite loop and log file consumption) via crafted endpoint file names.

EPSS

Процентиль: 71%
0.00693
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The filename sanitization component in ownCloud Server before 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4 does not properly handle $_GET parameters cast by PHP to an array, which allows remote attackers to cause a denial of service (infinite loop and log file consumption) via crafted endpoint file names.

nvd
больше 10 лет назад

The filename sanitization component in ownCloud Server before 6.0.8, 7.0.x before 7.0.6, and 8.0.x before 8.0.4 does not properly handle $_GET parameters cast by PHP to an array, which allows remote attackers to cause a denial of service (infinite loop and log file consumption) via crafted endpoint file names.

debian
больше 10 лет назад

The filename sanitization component in ownCloud Server before 6.0.8, 7 ...

fstec
больше 10 лет назад

Уязвимость веб-приложения для синхронизации данных ownCloud, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 71%
0.00693
Низкий