Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 substring.
References
Link | Resource |
---|---|
https://heitorgouvea.me/2019/09/17/CVE-2019-15033 | Exploit Third Party Advisory |
https://pydio.com | Product |
https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ | Release Notes |
https://heitorgouvea.me/2019/09/17/CVE-2019-15033 | Exploit Third Party Advisory |
https://pydio.com | Product |
https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ | Release Notes |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://heitorgouvea.me/2019/09/17/CVE-2019-15033 - Exploit, Third Party Advisory | |
References | () https://pydio.com - Product | |
References | () https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ - Release Notes |
Information
Published : 2019-09-19 17:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-15033
Mitre link : CVE-2019-15033
CVE.ORG link : CVE-2019-15033
JSON object : View
Products Affected
pydio
- pydio
CWE
CWE-918
Server-Side Request Forgery (SSRF)