Vulnerability CVE-2019-10049


Published: 2019-05-31   Modified: 2019-06-01

Description:
It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).

See advisories in our WLB2 database:
Topic
Author
Date
High
Pydio 8 Command Execution / Cross Site Scripting
Leandro Cuozzo
29.03.2019

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.9/10
4.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Pydio -> Pydio 

 References:
https://www.secureauth.com/labs/advisories

Copyright 2024, cxsecurity.com

 

Back to Top