RSS   Podatności dla 'Cells'   RSS

2021-09-30
 
CVE-2021-41324

CWE-22
 

 
Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete).

 
 
CVE-2021-41323

CWE-22
 

 
Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter.

 
 
CVE-2021-41325

CWE-863
 

 
Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.)

 
2020-06-05
 
CVE-2020-12849

CWE-79
 

 
Pydio Cells 2.0.4 allows any user to upload a profile image to the web application, including standard and shared user roles. These profile pictures can later be accessed directly with the generated URL by any unauthenticated or authenticated user.

 
 
CVE-2020-12848

CWE-732
 

 
In Pydio Cells 2.0.4, once an authenticated user shares a file selecting the create a public link option, a hidden shared user account is created in the backend with a random username. An anonymous user that obtains a valid public link can get the associated hidden account username and password and proceed to login to the web application. Once logged into the web application with the hidden user account, some actions that were not available with the public share link can now be performed.

 
2020-06-04
 
CVE-2020-12853

CWE-79
 

 
Pydio Cells 2.0.4 allows XSS. A malicious user can either upload or create a new file that contains potentially malicious HTML and JavaScript code to personal folders or accessible cells.

 
 
CVE-2020-12852

CWE-20
 

 
The update feature for Pydio Cells 2.0.4 allows an administrator user to set a custom update URL and the public RSA key used to validate the downloaded update package. The update process involves downloading the updated binary file from a URL indicated in the update server response, validating its checksum and signature with the provided public key and finally replacing the current application binary. To complete the update process, the application�??s service or appliance needs to be restarted. An attacker with administrator access can leverage the software update feature to force the application to download a custom binary that will replace current Pydio Cells binary. When the server or service is eventually restarted the attacker will be able to execute code under the privileges of the user running the application. In the Pydio Cells enterprise appliance this is with the privileges of the user named �??pydio�?�.

 
 
CVE-2020-12851

CWE-200
 

 
Pydio Cells 2.0.4 allows an authenticated user to write or overwrite existing files in another user�??s personal and cells folders (repositories) by uploading a custom generated ZIP file and leveraging the file extraction feature present in the web application. The extracted files will be placed in the targeted user folders.

 
 
CVE-2020-12847

CWE-20
 

 
Pydio Cells 2.0.4 web application offers an administrative console named �??Cells Console�?� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the application�??s mailer configuration. It is possible to configure a few engines to be used by the mailer application to send emails. If the user selects the �??sendmail�?� option as the default one, the web application offers to edit the full path where the sendmail binary is hosted. Since there is no restriction in place while editing this value, an attacker authenticated as an administrator user could force the web application into executing any arbitrary binary.

 
2019-06-19
 
CVE-2019-12903

CWE-200
 

 
Pydio Cells before 1.5.0, when supplied with a Name field in an unexpected Unicode format, fails to handle this and includes the database column/table name as pert of the error message, exposing sensitive information.

 


Copyright 2024, cxsecurity.com

 

Back to Top