• @hypercyanateB
    link
    fedilink
    English
    27 months ago

    This is why I don’t expose anything other than my wireguard on my network

    • @pastudanB
      link
      fedilink
      English
      17 months ago

      Also worth noting here: Exposing wireguard is quite safe because the daemon doesn’t even respond unless it recognizes your key. It just drops the UDP packet otherwise.

      Nothing is unhackable, but this is damn near close. Such a brilliant design.

  • @pentesticalsB
    link
    fedilink
    English
    27 months ago

    Honestly, all applications are vulnerable AF, especially the open source projects without a major team behind them. I work in a security research team and we find critical bugs like this in a weekly basis. Even in major projects which you would be scared to know about. I personally wouldn’t expose anything except SSH or a VPN, or if I have to expose a web app, it’s going inside a VLAN with very restrictive firewall rules, proper logging, and a reverse proxy enforcing authentication via an OIDC based IDP.

    We generally spend a couple of days to a week before finding something critical allowing RCE.

  • @jovialfactionB
    link
    fedilink
    English
    17 months ago

    That’s why I keep nextcloud behind http basic auth. Don’t trust those software to expose them directly to Internet.

    • @LuckyHedgehogB
      link
      fedilink
      English
      17 months ago

      Basic auth is better than no auth, but it is absolutely not a recommended auth method these days

        • @LuckyHedgehogB
          link
          fedilink
          English
          17 months ago

          Basic auth is a base64 of your login credentials, might as well be plain text. You should absolutely not be using basic auth if you have other options

    • @ShapeShifter499B
      link
      fedilink
      English
      17 months ago

      This would prevent nextcloud sync and phone apps from proper access wouldn’t it?

  • Arghblarg
    link
    fedilink
    English
    17 months ago

    As article states, you’re not vulnerable if you don’t have the ‘graphapi’ app installed, whatever that is. Checked my nextcloud instance and it’s not there.

  • @DryPhilosopher8168B
    link
    fedilink
    English
    17 months ago

    I can’t stress this enough, keep your private and enterprise cloud behind a vpn. Especially if you are a part time Admin with limited resources. Sooner or later you will be hacked.

    • @CoffeeCapyB
      link
      fedilink
      English
      17 months ago

      To my understanding, OCIS is a complete rewrite of OwnCloud and was written in Go. So my intuition tells me it’s not but I could be wrong.

  • @amarao_sanB
    link
    fedilink
    English
    17 months ago

    POST /api/admin/unauthorized_sudo

    Oh, no, it’s PhpGetInfo.php, sorry, my bad.

  • @cheveretoB
    link
    fedilink
    English
    17 months ago

    I’m surprised that ownCloud didn’t use a single PHP entrypoint. In PHP software you must restrict access to .php files, that’s front controller basis. They really did bad and I’m very disappointed.

  • @the-last-userB
    link
    fedilink
    English
    17 months ago

    Thanks, OP. Now if only I could figure out how to change the SQLite database password in ownCloud 10.10 (it’s not stored in config.php, but there is a “passwordsalt” configured there).