CVE-2019-10049

It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).
References
Link Resource
https://www.secureauth.com/labs/advisories Exploit Third Party Advisory
https://www.secureauth.com/labs/advisories Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pydio:pydio:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () https://www.secureauth.com/labs/advisories - Exploit, Third Party Advisory () https://www.secureauth.com/labs/advisories - Exploit, Third Party Advisory

Information

Published : 2019-05-31 22:29

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10049

Mitre link : CVE-2019-10049

CVE.ORG link : CVE-2019-10049


JSON object : View

Products Affected

pydio

  • pydio
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')