Session fixation on password protected public links in the ownCloud Server before 10.8.0 allows an attacker to bypass the password protection when they can force a target client to use a controlled cookie.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Owncloud | Owncloud | * | 10.8.0 (excluding) |
Owncloud | Ubuntu | trusty | * |
Owncloud | Ubuntu | xenial | * |
Such a scenario is commonly observed when: