Hackers are exploiting a critical ownCloud vulnerability tracked as CVE-2023-49103 that exposes admin passwords, mail server credentials, and license keys in containerized deployments. OwnCloud is a widely used open-source file synchronization and sharing solution designed for those who wish to manage and share data through a self-hosted platform. On November 21, the software's developers published security bulletins for three vulnerabilities that could lead to data breaches, urging ownCloud administrators to apply the recommended mitigations immediately. Of the three flaws, CVE-2023-49103 received a maximum CVSS severity score of 10.0 as it allows a remote threat actor to execute phpinfo() through the ownCloud 'graphapi' app, which reveals the server's environment variables, including credentials stored within them. "In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key," reads the CVE-2023-49103 advisory. If other services in the same environment use the same variants and configurations, the same credentials can be used to access those services as well, expanding the breach. Leveraging CVE-2023-49103 for data theft attacks isn't complicated, and threat actors have already been discovered exploiting the flaw in attacks. Threat tracking firm Greynoise reported yesterday that it observed mass exploitation of the flaw in the wild starting on November 25, 2023, with a rising trajectory. Greynoise tracked 12 unique IP addresses exploiting CVE-2023-49103. Shadowserver also reports similar observations, warning that it currently detects over 11,000 vulnerable instances, with most located in Germany, the United States, France, and Russia. Due to the increased exploitation of this flaw, ownCloud administrators are recommended to take immediate action to remediate the risk. The recommended fix is to delete the 'owncloud/apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo. Php' file, disable the 'phpinfo' function in Docker containers, and change potentially exposed secrets like the ownCloud admin password, mail server, database credentials, and Object-Store/S3 access keys. It is important to note that disabling the graphapi app does not mitigate the threat, which is equally severe for both containerized and non-containerized environments. The only case resistant to the credential disclosure problem is Docker containers created before February 2023. Critical bug in ownCloud file sharing app exposes admin passwords. Citrix Bleed exploit lets hackers hijack NetScaler accounts. Recently patched Citrix NetScaler bug exploited as zero-day since August. Google Drive users angry over losing months of stored data. Learn Azure at your own pace with $77 off this exam prep bundle.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 30 Nov 2023 23:19:27 +0000