Pydio Cells allows users by default to create so-called external users in order to share files with them. By modifying the HTTP request sent when creating such an external user, it is possible to assign the new user arbitrary roles. By assigning all roles to a newly created user, access to all cells and non-personal workspaces is granted.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/May/18 | Exploit Mailing List Third Party Advisory |
https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses | Third Party Advisory |
https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/May/18 | Exploit Mailing List Third Party Advisory |
https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses | Third Party Advisory |
https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2023/May/18 - Exploit, Mailing List, Third Party Advisory | |
References | () https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses - Third Party Advisory | |
References | () https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments - Exploit, Third Party Advisory |
15 Jun 2023, 18:54
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments - Exploit, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2023/May/18 - Exploit, Mailing List, Third Party Advisory | |
References | (MISC) https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses - Third Party Advisory | |
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Pydio
Pydio cells |
|
CPE | cpe:2.3:a:pydio:cells:*:*:*:*:*:*:*:* |
08 Jun 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-08 20:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32749
Mitre link : CVE-2023-32749
CVE.ORG link : CVE-2023-32749
JSON object : View
Products Affected
pydio
- cells
CWE
CWE-863
Incorrect Authorization