Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AB005B3-22C4-4365-B287-FBF77657DE66", "versionEndIncluding": "4.0.8", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "77DE37D0-74E5-4D66-8A2D-DA177936A4F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB0E5BB3-900E-4D95-B302-4120567B6155", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1BB82C7-11E5-44E4-9029-76AE1F4AE937", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "40348D52-10C6-4436-84DC-4B63271AF180", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D77D4260-0D48-47EE-A09B-FC200CB36A38", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "78FEEBC0-9483-4EBE-B6E4-5390144A36F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DED1F21-0941-4E3C-BA04-15D1C3B685C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "3A7951FE-9C41-4CCF-933F-56204147148B", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8F36384F-ECB2-48F5-AB32-85AB643CD816", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DA03000-6D01-4CDA-8C83-C2AFC649B869", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8206EE35-2939-44B4-BBCF-C384C6206122", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E7E07400-C700-454C-B5EF-4992F2089BE1", "vulnerable": true}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "56D46962-C2C4-4468-9DB0-15AFF4FE8032", "vulnerable": false}, {"criteria": "cpe:2.3:a:owncloud:owncloud_server:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8577131-CCE2-4B98-8763-8F99E267BD5B", "vulnerable": false}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Incomplete blacklist vulnerability in lib/filesystem.php in ownCloud before 4.0.9 and 4.5.x before 4.5.2 allows remote authenticated users to execute arbitrary PHP code by uploading a file with a special crafted name."}, {"lang": "es", "value": "Vulnerabilidad lista negra incompleta en lib/filesystem.php en ownCloud antes de v4.0.9 y v4.5.x antes de v4.5.2 permite a usuarios remotos autenticados ejecutar c\u00f3digo PHP arbitrario mediante la carga de un archivo con un nombre especial manipulado."}], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'", "id": "CVE-2012-5610", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-12-18T01:55:07.507", "references": [{"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://owncloud.org/changelog/"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://owncloud.org/security/advisories/oc-sa-2012-005/"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/51357"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/11/30/3"}, {"source": "secalert@redhat.com", "url": "https://github.com/owncloud/core/commit/3cd416b667"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "https://github.com/owncloud/core/commit/4b86c43"}, {"source": "secalert@redhat.com", "url": "https://github.com/owncloud/core/commit/6540c0fc63"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "https://github.com/owncloud/core/commit/f599267"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://owncloud.org/changelog/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://owncloud.org/security/advisories/oc-sa-2012-005/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/51357"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/11/30/3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/owncloud/core/commit/3cd416b667"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://github.com/owncloud/core/commit/4b86c43"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/owncloud/core/commit/6540c0fc63"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://github.com/owncloud/core/commit/f599267"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}