Vulnerability CVE-2019-10045


Published: 2019-05-31   Modified: 2019-06-01

Description:
The "action" get_sess_id in the web application of Pydio through 8.2.2 discloses the session cookie value in the response body, enabling scripts to get access to its value. This identifier can be reused by an attacker to impersonate a user and perform actions on behalf of him/her (if the session is still active).

See advisories in our WLB2 database:
Topic
Author
Date
High
Pydio 8 Command Execution / Cross Site Scripting
Leandro Cuozzo
29.03.2019

Type:

CWE-384

(Session Fixation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Pydio -> Pydio 

 References:
https://www.secureauth.com/labs/advisories

Copyright 2024, cxsecurity.com

 

Back to Top