CVE-2020-12848

In Pydio Cells 2.0.4, once an authenticated user shares a file selecting the create a public link option, a hidden shared user account is created in the backend with a random username. An anonymous user that obtains a valid public link can get the associated hidden account username and password and proceed to login to the web application. Once logged into the web application with the hidden user account, some actions that were not available with the public share link can now be performed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pydio:cells:2.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 05:00

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html - Third Party Advisory () http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html - Third Party Advisory
References () https://www.coresecurity.com/advisories - Third Party Advisory () https://www.coresecurity.com/advisories - Third Party Advisory
References () https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities - Exploit, Third Party Advisory () https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities - Exploit, Third Party Advisory

Information

Published : 2020-06-05 13:15

Updated : 2024-11-21 05:00


NVD link : CVE-2020-12848

Mitre link : CVE-2020-12848

CVE.ORG link : CVE-2020-12848


JSON object : View

Products Affected

pydio

  • cells
CWE
CWE-287

Improper Authentication