CVE-2020-36249
📋 TL;DR
This vulnerability allows attackers to bypass file-type restrictions on public shares in ownCloud Server. Attackers can upload files of prohibited types to public shares even when the File Firewall is configured to block them. This affects ownCloud Server instances using the File Firewall feature with public shares enabled.
💻 Affected Systems
- ownCloud Server
📦 What is this software?
File Firewall by Owncloud
⚠️ Risk & Real-World Impact
Worst Case
Malicious actors upload malware, ransomware, or malicious scripts to public shares, potentially compromising systems of users who download these files or enabling further attacks through file execution.
Likely Case
Attackers bypass content filtering to upload unauthorized file types (like executables, scripts, or malicious documents) to public shares, potentially distributing malware or phishing content.
If Mitigated
With proper network segmentation and user education about downloading files from untrusted sources, impact is limited to potential distribution of malicious files that may be caught by endpoint protection.
🎯 Exploit Status
Exploitation requires access to a public share link but no authentication. The bypass technique is documented in the advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: File Firewall 2.8.0
Vendor Advisory: https://owncloud.com/security-advisories/bypassing-file-firewall-oc-sa-2020-002/
Restart Required: No
Instructions:
1. Update the File Firewall app to version 2.8.0 or later via the ownCloud marketplace or manual installation. 2. Verify the update in the Apps section of the ownCloud admin interface.
🔧 Temporary Workarounds
Disable public shares
allTemporarily disable public link sharing to prevent exploitation while planning the update.
Navigate to Admin -> Sharing -> Allow public uploads and set to 'No'
Remove File Firewall app
allUninstall the vulnerable File Firewall app if file-type restrictions are not critical.
Navigate to Apps -> Disable and uninstall File Firewall
🧯 If You Can't Patch
- Monitor public share uploads for prohibited file types using log analysis or file integrity monitoring.
- Implement network filtering or web application firewall rules to block uploads of dangerous file extensions to ownCloud.
🔍 How to Verify
Check if Vulnerable:
Check the File Firewall app version in ownCloud Admin -> Apps. If version is below 2.8.0 and public shares are enabled, the system is vulnerable.
Check Version:
Check via ownCloud web interface: Admin -> Apps -> File Firewall
Verify Fix Applied:
After updating, verify File Firewall version is 2.8.0 or higher in the Apps section. Test by attempting to upload a prohibited file type to a public share - it should be blocked.
📡 Detection & Monitoring
Log Indicators:
- Failed file upload attempts to public shares that should have been blocked by file-type restrictions
- Successful uploads of file types configured to be blocked
Network Indicators:
- Unusual file upload patterns to public share URLs, especially with executable extensions
SIEM Query:
source="owncloud" AND (event="file_upload" OR event="share_created") AND file_extension IN ("exe", "bat", "ps1", "sh", "php", "js")