Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49103: n/a

0
Critical
VulnerabilityCVE-2023-49103cvecve-2023-49103
Published: Tue Nov 21 2023 (11/21/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:03:57 UTC

Technical Analysis

CVE-2023-49103 is a critical information disclosure vulnerability found in the ownCloud graphapi application, specifically in versions 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The root cause is the inclusion of a third-party PHP script, GetPhpInfo.php, which exposes the output of the phpinfo() function via a publicly accessible URL. The phpinfo() output reveals detailed PHP environment configuration, including all environment variables set in the webserver context. In containerized deployments, these environment variables often contain sensitive secrets such as the ownCloud administrator password, mail server credentials, and license keys. This exposure allows unauthenticated remote attackers to retrieve critical credentials and configuration details without any user interaction. The vulnerability is particularly severe in containerized environments because environment variables are commonly used to inject secrets into containers. Notably, simply disabling the graphapi app does not remove the vulnerability, as the GetPhpInfo.php endpoint remains accessible. The vulnerability affects Docker containers built before February 2023; newer containers have addressed this issue. The CVSS v3.1 score is 10.0 (critical), with attack vector network, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and the sensitivity of the disclosed information make this a high-risk vulnerability requiring immediate attention.

Potential Impact

For European organizations, the impact of CVE-2023-49103 is significant, especially for those using ownCloud in containerized environments. Disclosure of environment variables can lead to compromise of administrative credentials, mail server accounts, and license keys, enabling attackers to gain unauthorized access, escalate privileges, and potentially disrupt services. This can result in data breaches, loss of data integrity, and service outages. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data) face legal and reputational risks if exploited. The vulnerability's ability to be exploited remotely without authentication increases the attack surface and risk of widespread exploitation. Containerized deployments, increasingly common in European enterprises for scalability and modernization, are particularly vulnerable. Even non-containerized deployments risk exposure of system configuration details that can aid attackers in crafting further attacks. The critical severity and ease of exploitation necessitate urgent remediation to protect confidentiality, integrity, and availability of ownCloud services and associated infrastructure.

Mitigation Recommendations

European organizations should immediately upgrade the ownCloud graphapi app to versions 0.2.1 or later and 0.3.1 or later, which address this vulnerability. If upgrading is not immediately possible, organizations should remove or restrict access to the GetPhpInfo.php endpoint to prevent public exposure of phpinfo output. Network-level controls such as firewall rules or web application firewall (WAF) policies should be implemented to block unauthorized access to this endpoint. Container images should be rebuilt using versions released after February 2023 to ensure the vulnerability is not present. Secrets should be managed using secure vaults or environment variable injection mechanisms that do not expose sensitive data via phpinfo or similar debug endpoints. Regular audits of container images and web applications should be conducted to detect and remove any debug or information disclosure endpoints. Monitoring and alerting for unusual access patterns to the graphapi app or phpinfo endpoints can help detect exploitation attempts. Finally, organizations should review and rotate any potentially exposed credentials to mitigate risks from past exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-11-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ae247d717aace26799

Added to database: 10/21/2025, 7:06:22 PM

Last enriched: 10/21/2025, 8:03:57 PM

Last updated: 10/30/2025, 3:11:38 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats