Pydio version 8.2.0 and earlier contains a Server-Side Request Forgery (SSRF) vulnerability in plugins/action.updater/UpgradeManager.php Line: 154, getUpgradePath($url) that can result in an authenticated admin users requesting arbitrary URL's, pivoting requests through the server. This attack appears to be exploitable via the attacker gaining access to an administrative account, enters a URL into Upgrade Engine, and reloads the page or presses "Check Now". This vulnerability appears to have been fixed in 8.2.1.
References
Link | Resource |
---|---|
https://pydio.com/en/community/releases/pydio-core/pydio-821-security-release | Release Notes Patch Vendor Advisory |
https://www.mike-gualtieri.com/files/Pydio-8-VulnerabilityDisclosure-Jul18.txt | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:22:22
Updated: 2022-10-03T16:22:22
Reserved: 2018-07-17T00:00:00
Link: CVE-2018-1999017
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-07-23T15:29:00.597
Modified: 2018-09-20T13:21:47.077
Link: CVE-2018-1999017
JSON object: View
Redhat Information
No data.
CWE