| |
Vulnerability CVE-2019-10049
Published: 2019-05-31 Modified: 2019-06-01
Description: |
It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her). |
See advisories in our WLB2 database: | Topic | Author | Date |
High |
| Leandro Cuozzo | 29.03.2019 |
Type:
CWE-264 (Permissions, Privileges, and Access Controls)
CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
4.9/10 |
4.9/10 |
6.8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
None |
References: |
https://www.secureauth.com/labs/advisories
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|