It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).
References
Link | Resource |
---|---|
https://www.secureauth.com/labs/advisories | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-31T21:17:46
Updated: 2019-05-31T21:17:46
Reserved: 2019-03-25T00:00:00
Link: CVE-2019-10049
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-05-31T22:29:01.130
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-10049
JSON object: View
Redhat Information
No data.
CWE