It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).
References
Link | Resource |
---|---|
https://www.secureauth.com/labs/advisories | Exploit Third Party Advisory |
https://www.secureauth.com/labs/advisories | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.secureauth.com/labs/advisories - Exploit, Third Party Advisory |
Information
Published : 2019-05-31 22:29
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10049
Mitre link : CVE-2019-10049
CVE.ORG link : CVE-2019-10049
JSON object : View
Products Affected
pydio
- pydio
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')