{"containers":{"cna":{"affected":[{"product":"Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4","vendor":"n/a","versions":[{"status":"affected","version":"Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4"}]}],"datePublic":"2017-03-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-451","description":"User Interface (UI) Misrepresentation of Critical Information (CWE-451)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2017-04-03T09:57:01.000Z","orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone"},"references":[{"tags":["x_refsource_MISC"],"url":"https://hackerone.com/reports/145463"},{"tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/server/commit/8aa0832bd449c44ec300da4189bd8ed4e036140c"},{"tags":["x_refsource_MISC"],"url":"https://owncloud.org/security/advisory/?id=oc-sa-2016-013"},{"tags":["x_refsource_MISC"],"url":"https://nextcloud.com/security/advisory/?id=nc-sa-2016-003"},{"name":"97282","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/97282"},{"tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/server/commit/dea8e29289a1b99d5e889627c2e377887f4f2983"},{"tags":["x_refsource_MISC"],"url":"https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf"},{"tags":["x_refsource_MISC"],"url":"https://github.com/nextcloud/server/commit/2da43e3751576bbc838f238a09955c4dcdebee8e"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"support@hackerone.com","ID":"CVE-2016-9460","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4","version":{"version_data":[{"version_value":"Nextcloud Server & ownCloud Server Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"User Interface (UI) Misrepresentation of Critical Information (CWE-451)"}]}]},"references":{"reference_data":[{"name":"https://hackerone.com/reports/145463","refsource":"MISC","url":"https://hackerone.com/reports/145463"},{"name":"https://github.com/nextcloud/server/commit/8aa0832bd449c44ec300da4189bd8ed4e036140c","refsource":"MISC","url":"https://github.com/nextcloud/server/commit/8aa0832bd449c44ec300da4189bd8ed4e036140c"},{"name":"https://owncloud.org/security/advisory/?id=oc-sa-2016-013","refsource":"MISC","url":"https://owncloud.org/security/advisory/?id=oc-sa-2016-013"},{"name":"https://nextcloud.com/security/advisory/?id=nc-sa-2016-003","refsource":"MISC","url":"https://nextcloud.com/security/advisory/?id=nc-sa-2016-003"},{"name":"97282","refsource":"BID","url":"http://www.securityfocus.com/bid/97282"},{"name":"https://github.com/nextcloud/server/commit/dea8e29289a1b99d5e889627c2e377887f4f2983","refsource":"MISC","url":"https://github.com/nextcloud/server/commit/dea8e29289a1b99d5e889627c2e377887f4f2983"},{"name":"https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf","refsource":"MISC","url":"https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf"},{"name":"https://github.com/nextcloud/server/commit/2da43e3751576bbc838f238a09955c4dcdebee8e","refsource":"MISC","url":"https://github.com/nextcloud/server/commit/2da43e3751576bbc838f238a09955c4dcdebee8e"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T02:50:38.345Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://hackerone.com/reports/145463"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/server/commit/8aa0832bd449c44ec300da4189bd8ed4e036140c"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://owncloud.org/security/advisory/?id=oc-sa-2016-013"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://nextcloud.com/security/advisory/?id=nc-sa-2016-003"},{"name":"97282","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/97282"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/server/commit/dea8e29289a1b99d5e889627c2e377887f4f2983"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/owncloud/core/commit/c92c234059f8b1dc7d53122985ec0d398895a2cf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/nextcloud/server/commit/2da43e3751576bbc838f238a09955c4dcdebee8e"}]}]},"cveMetadata":{"assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","assignerShortName":"hackerone","cveId":"CVE-2016-9460","datePublished":"2017-03-28T02:46:00.000Z","dateReserved":"2016-11-19T00:00:00.000Z","dateUpdated":"2024-08-06T02:50:38.345Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}