Pydio version 8.2.0 and earlier contains a Server-Side Request Forgery (SSRF) vulnerability in plugins/action.updater/UpgradeManager.php Line: 154, getUpgradePath($url) that can result in an authenticated admin users requesting arbitrary URL's, pivoting requests through the server. This attack appears to be exploitable via the attacker gaining access to an administrative account, enters a URL into Upgrade Engine, and reloads the page or presses "Check Now". This vulnerability appears to have been fixed in 8.2.1.
References
Link | Resource |
---|---|
https://pydio.com/en/community/releases/pydio-core/pydio-821-security-release | Patch Release Notes Vendor Advisory |
https://www.mike-gualtieri.com/files/Pydio-8-VulnerabilityDisclosure-Jul18.txt | Exploit Third Party Advisory |
https://pydio.com/en/community/releases/pydio-core/pydio-821-security-release | Patch Release Notes Vendor Advisory |
https://www.mike-gualtieri.com/files/Pydio-8-VulnerabilityDisclosure-Jul18.txt | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://pydio.com/en/community/releases/pydio-core/pydio-821-security-release - Patch, Release Notes, Vendor Advisory | |
References | () https://www.mike-gualtieri.com/files/Pydio-8-VulnerabilityDisclosure-Jul18.txt - Exploit, Third Party Advisory |
Information
Published : 2018-07-23 15:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999017
Mitre link : CVE-2018-1999017
CVE.ORG link : CVE-2018-1999017
JSON object : View
Products Affected
pydio
- pydio
CWE
CWE-918
Server-Side Request Forgery (SSRF)