marketplace.owncloud.com Open in urlscan Pro
2a01:4f8:c010:9587::1  Public Scan

Submitted URL: http://go.owncloud.com/MDM4LUtSTC01OTIAAAGPwFrc0D7kEcPPTOTTX8F44K50PlIqquhpvXmND0D9DQDZ3MYsd9McyjE7w9XzfS5vowOKmUo=
Effective URL: https://marketplace.owncloud.com/apps/oauth2?mkt_tok=MDM4LUtSTC01OTIAAAGPwFrc0HPtj6nJ4rowgjHAOsf8Wt6TPsuQc0RapHqpzxwTqQ-gBqVkg8gC...
Submission: On November 30 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

<form action="" class="search__form"><input name="search" type="search" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false" class="search__input"> <span
    class="uk-display-block uk-text-right uk-margin-top">Hit enter to search or ESC to close</span></form>

<form><!----> <!----> <!----></form>

POST

<form data-v-636ee198="" method="post" id="sendMessage" novalidate="novalidate" autocomplete="off" class="overlay-related">
  <div data-v-636ee198="" class="overlay-inner overlay-inner-top">
    <div data-v-636ee198="" class="uk-container uk-padding uk-height-1-1">
      <div data-v-636ee198="" class="uk-height-1-1 uk-position-relative"><button data-v-636ee198="" type="button" uk-close="" class="uk-icon uk-close"><svg width="14" height="14" viewBox="0 0 14 14" xmlns="http://www.w3.org/2000/svg"
            data-svg="close-icon">
            <line fill="none" stroke="#000" stroke-width="1.1" x1="1" y1="1" x2="13" y2="13"></line>
            <line fill="none" stroke="#000" stroke-width="1.1" x1="13" y1="1" x2="1" y2="13"></line>
          </svg></button>
        <div data-v-636ee198="" uk-grid="" class="uk-child-width-1-2@m uk-height-1-1 uk-flex uk-flex-middle uk-grid">
          <div data-v-636ee198="" class="uk-first-column">
            <p data-v-636ee198=""> Thank you for helping us preventing any abuse on the ownCloud marketplace. Please specify why you think, this page should be checked by us. </p>
            <div data-v-636ee198=""><label data-v-636ee198=""><input data-v-636ee198="" id="report-1" name="reason" type="radio" value="malicious content" class="uk-radio" aria-required="true" aria-invalid="false"> This app contains malicious or
                unsave code</label></div>
            <div data-v-636ee198=""><label data-v-636ee198=""><input data-v-636ee198="" id="report-2" name="reason" type="radio" value="spam or advertising" class="uk-radio" aria-required="true" aria-invalid="false"> This app is spam or contains
                advertising contents</label></div>
            <div data-v-636ee198=""><label data-v-636ee198=""><input data-v-636ee198="" id="report-3" name="reason" type="radio" value="copyright infringement" class="uk-radio" aria-required="true" aria-invalid="false"> This app violates the terms of
                copyright</label></div>
            <div data-v-636ee198=""><label data-v-636ee198=""><input data-v-636ee198="" id="report-4" name="reason" type="radio" value="other" class="uk-radio" aria-required="true" aria-invalid="false"> Any other reason</label></div> <!---->
          </div>
          <div data-v-636ee198=""><!----></div>
        </div>
      </div>
    </div>
  </div>
  <div data-v-636ee198="" class="overlay-inner overlay-inner-bottom">
    <div data-v-636ee198="" class="uk-container uk-padding">
      <div data-v-636ee198="" uk-grid="" class="uk-child-width-1-2@m uk-height-1-1 uk-flex uk-flex-middle uk-grid uk-grid-stack">
        <div data-v-636ee198="" class="uk-first-column">
          <p data-v-636ee198=""> To be able to get back to you please enter your email address </p>
          <div data-v-636ee198="" class="uk-margin"><input data-v-636ee198="" placeholder="Your email address *" type="email" data-vv-name="email" class="uk-input" aria-required="true" aria-invalid="false"> <!----></div>
          <div data-v-636ee198="" uk-alert="" class="uk-alert-danger uk-alert" style="display: none;"> There was an error while sending your report. Please try again later. </div> <!----> <button data-v-636ee198="" type="submit"
            class="uk-button uk-button-primary">Send report<span data-v-636ee198="" uk-icon="play" class="uk-icon"><svg width="20" height="20" viewBox="0 0 20 20" xmlns="http://www.w3.org/2000/svg" data-svg="play">
                <polygon fill="none" stroke="#000" points="6.5,5 14.5,10 6.5,15"></polygon>
              </svg></span></button>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

Hit enter to search or ESC to close


SEARCH, AND YOU WILL FIND.

Search through all apps on the ownCloud marketplace.


MAY WE SUGGEST?

#enterprise #contacts #onlyoffice #calendar #firewall #ldap


 * Sign up now
 * ownCloud Enterprise


 *  * Account
    * Organization
    * 
    * Avatar
    * 
    * My Products
    * Purchases
    * Logout

 * 
 * 

 * Log in
 * Sign up now
   
 * ownCloud Enterprise
 * 
 * Browse Categories
 * Apps
 * Themes
 * Publishers


 * apps
 * Security


OAUTH2


OAUTH2 TOKEN-BASED AUTHORIZATION INTERFACE

OAuth2 is the open industry-standard protocol for secure authorization of
clients. It can be used as a way for users to grant web services or applications
access to their data stored in ownCloud. The use of OAuth2 in ownCloud greatly
enhances security while facilitating the integration of third party applications
or web services:

 * Connect ownCloud clients (Desktop, Android, iOS) through a standardized and
   secure authorization flow
 * Provide a user authorization interface for developers to facilitate the
   integration of ownCloud in third party applications


BENEFITS PROVIDED BY THE OAUTH2 INTERFACE

 * No user passwords are being stored in ownCloud clients or third party web
   applications

Instead of connecting clients with username/password, a user only needs to
provide the information once in the browser. The respective client is then
provided with a unique access token which is used for future connections to the
ownCloud server. ownCloud clients or third party applications never get to know
the actual login credentials.

 * The use of different access tokens per client provides the ability to
   selectively revoke user sessions

When using OAuth2 a unique access token is generated for each device or third
party application. Users can check their authorized clients in the personal
settings and have the ability to selectively invalidate access tokens when e.g.
a device is lost. This strengthens control and access security significantly.


RESOURCES

 * OAuth - Wikipedia
 * OAuth protocol web page

 * download v 0.6.1
 * 
 * 
   Publisher
   
   ownCloud
   
   
   Release date
   
   Sep. 1st 2023
   
   
   Downloads
   
   51312
   
   
   License
   
   GNU Affero General Public License
   
   
   Category
   
   Security
   
   
   Bug tracker
   
   owncloud/oauth2/issues

 * DOCUMENTATION
   
   No documentation available

Version Release Date Compatible with ownCloud version 0.6.1 Sep. 1st 2023
10.11.0 - 10.x.x (higher)


FIXED

 * #359 - fix: harden subdomain validation
   * This resolves CVE-2023-49104
   * Subdomain Valdiation Bypass

0.6.0 Aug. 22th 2023 10.11.0 - 10.x.x (higher)


CHANGED

 * #353 - Always return an int from Symfony Command execute method
 * Minimum core version 10.11, minimum php version 7.4
 * Download URL string changes
 * Bump libraries

0.5.4 Sep. 1st 2023 10.3.0 - 10.x.x (higher)


FIXED

 * #359 - fix: harden subdomain validation

0.5.3 Jun. 9th 2022 10.3.0 - 10.x.x (higher)


FIXED

 * #327 - Use userid on api calls, show username in login form
 * #331 - Add missing token index
 * #337 - Don't require client secret when using PKCE


CHANGED

 * #328 - Fill login_hint with username

0.5.2 Nov. 17th 2021 10.3.0 - 10.x.x (higher)


[0.5.2] - 2021-11-02

 * #313 - Add occ oauth2:list command
 * #315 - Sanitize output of command oauth2:list-clients
 * #314 - Add occ oauth2:modify-client command

0.5.1 Oct. 20th 2021 10.3.0 - 10.x.x (higher)

Fix user lookup in authmodule #307

0.5.0 Sep. 16th 2021 10.3.0 - 10.x.x (higher)


ADDED

 * Add support for trusted clients #298
 * Support setups with user login name != internal UID #286
 * Implement the oauth2 pkce extension #276


CHANGED

 * Return proper error description for auth-core/refresh-token errors #279
 * Adjust PHP dependencies for composer 2.0 #273

0.4.4 Oct. 22th 2020 10.2.0 - 10.x.x (higher)


FIXED

 * No exception in case the token is unknown and the openid connect app is
   enabled - #255


CHANGES

 * Updated libraries

 * Updated translations


LIST OF ALL CHANGES

https://github.com/owncloud/oauth2/compare/v0.4.3...v0.4.4

0.4.3 Dec. 20th 2019 10.2.0 - 10.x.x (higher)


CHANGED

 * Improve adding a new client - #237
 * Drop PHP Support 7.0 - #238

0.4.2 Nov. 22th 2019 10.2.0 - 10.x.x (higher)


CHANGED

 * Handle refresh token of a disabled user - #225
 * Use a WHATWG URL spec compliant URL parser - see https://url.spec.wha… - #229
 * Remove back button from error page, add logging and return proper err… - #220
 * Check user status - #209


ADDED

 * New Dependecy on php-gmp extension

0.4.1 May. 15th 2019 10.0.0 - 10.x.x (higher)


FIXED

 * The redirect_uri needs to be encoded in the logout url - #197

0.4.0 Feb. 13th 2019 10.0.0 - 10.x.x (higher)


ADDED

 * Display currently logged in user display name in authorization page - #188
 * Added option for switching user in authorization page - #188

0.3.0 Dec. 7th 2018 10.0.0 - 10.x.x (higher)


ADDED

 * Added autofocus to buttons - #173
 * Add occ oauth2:remove-client to remove a client by its id - #178
 * Support for PHP 7.1 and 7.2 - #161
 * Support for implicit grant - #166


CHANGED

 * Set max version to 10 because core platform is switching to Semver - #180


FIXED

 * Don't fail if the client was already added - #176
 * Use markdown properly in description - #153

0.2.3 Aug. 9th 2018 10.0.0 - 10.1.x (higher)


FIXED

 * Erroneous ownCloud 2.4.2 client behavior causing service interruptions #145
 * Initialization for password-less sessions #129

0.2.2 Apr. 4th 2018 10.0.0 - 10.1.x (higher)


ADDED

 * OpenID Connect UserInfo endpoint


FIXED

 * Expired token causing server failures

0.2.1 Nov. 28th 2017 10.0.0 - 10.0.x (higher)


FIXED

 * OAuth app blocking public uploads

0.2.0 Oct. 13th 2017 10.0.0 - 10.0.x (higher)


ADDED

 * Oracle and 4-byte MySQL support


CHANGED

 * Allow multiple tokens per client

Detailed Changelog

Thank you for helping us preventing any abuse on the ownCloud marketplace.
Please specify why you think, this page should be checked by us.

This app contains malicious or unsave code
This app is spam or contains advertising contents
This app violates the terms of copyright
Any other reason


To be able to get back to you please enter your email address


There was an error while sending your report. Please try again later.
Send report


MARKETPLACE

 * FAQ
 * Contact
 * Imprint
 * Terms and conditions
 * About ownCloud


INTERACT

 * Bug Tracker
 * Forums
 * Developer Manuals
 * IRC Channel