Steps to reproduce
- Upload a mp3 file
Expected behaviour
Tell us what should happen
No errors in log file
Actual behaviour
Tell us what happens instead
{“reqId”:“8JX26PjMA4VI9G3VN4qw”,“level”:3,“time”:“2020-04-09T17:35:36+02:00”,“remoteAddr”:“XXX.XXX.XXX.XXX”,“user”:“MYUSER”,“app”:“PHP”,“method”:“GET”,“url”:"/owncloud/remote.php/dav/files/MYUSER/Medien/Musik/S%C3%B6hne%20Mannheims/S%C3%B6hne%20Mannheims%20-%20Geh%20Davon%20Aus.mp3?c=f748cd760cd20ef0563eff22c9081ad2&x=32&y=32&forceIcon=0&preview=1",“message”:“imagecreatefromstring(): Empty string or invalid image at /var/www/html/owncloud/lib/private/legacy/image.php#573”}
Server configuration
Operating system:
Raspbian 10 (buster)
Web server:
Apache/2.4.38 (Raspbian)
Database:
10.3.22-MariaDB
PHP version:
PHP 7.3.14-1~deb10u1
ownCloud version: (see ownCloud admin page)
10.4.0 (stable)
Updated from an older ownCloud or fresh install:
updated
Where did you install ownCloud from:
Zip Archive
Signing status (ownCloud 9.0 and above):
Login as admin user into your ownCloud and access
http://example.com/index.php/settings/integrity/failed
paste the results into https://gist.github.com/ and puth the link here.
The content of config/config.php:
Log in to the web-UI with an administrator account and click on
'admin' -> 'Generate Config Report' -> 'Download ownCloud config report'
This report includes the config.php settings, the list of activated apps
and other details in a well sanitized form.
or
If you have access to your command line run e.g.:
sudo -u www-data php occ config:list system
from within your ownCloud installation folder
*ATTENTION:* Do not post your config.php file in public as is. Please use one of the above
methods whenever possible. Both, the generated reports from the web-ui and from occ config:list
consistently remove sensitive data. You still may want to review the report before sending.
If done manually then it is critical for your own privacy to dilligently
remove *all* host names, passwords, usernames, salts and other credentials before posting.
You should assume that attackers find such information and will use them against your systems.
List of activated apps:
If you have access to your command line run e.g.:
sudo -u www-data php occ app:list
from within your ownCloud installation folder.
Enabled:
- activity: 2.5.3
- audioplayer: 2.8.4
- brute_force_protection: 1.0.1
- calendar: 1.6.4
- comments: 0.3.0
- configreport: 0.2.0
- contacts: 1.5.5
- dav: 0.5.0
- extract: 1.2.3
- federatedfilesharing: 0.5.0
- federation: 0.1.0
- files: 1.5.2
- files_clipboard: 1.0.2
- files_external: 0.7.1
- files_mediaviewer: 1.0.2
- files_pdfviewer: 0.11.1
- files_sharing: 0.12.0
- files_texteditor: 2.3.0
- files_trashbin: 0.9.1
- files_versions: 1.3.0
- firstrunwizard: 1.2.0
- market: 0.5.0
- metadata: 0.10.0
- music: 0.13.2
- notifications: 0.5.0
- password_policy: 2.1.2
- provisioning_api: 0.5.0
- systemtags: 0.3.0
- templateeditor: 0.4.0
- theme-blindbaucloud: 2.0.0
- updatenotification: 0.2.1
Disabled:
- encryption
- external
- user_external
Are you using external storage, if yes which one: local/smb/sftp/…
no
Are you using encryption: yes/no
no
Are you using an external user-backend, if yes which one: LDAP/ActiveDirectory/Webdav/…
no
Client configuration
Browser:
Operating system:
Logs
Web server error log
Insert your webserver log here
ownCloud log (data/owncloud.log)
Insert your ownCloud log here
Browser log
Insert your browser log here, this could for example include:
a) The javascript console log
b) The network log
c) ...