The following vulnerability applies only to the Pydio Cells Enterprise OVF version 2.0.4. Prior versions of the Pydio Cells Enterprise OVF (such as version 2.0.3) have a looser policy restriction allowing the “pydio” user to execute any privileged command using sudo. In version 2.0.4 of the appliance, the user pydio is responsible for running all the services and binaries that are contained in the Pydio Cells web application package, such as mysqld, cells, among others. This user has privileges restricted to run those services and nothing more.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/158002/Pydio-Cells-2.0.4-XSS-File-Write-Code-Execution.html | Third Party Advisory VDB Entry |
https://www.coresecurity.com/advisories | Third Party Advisory |
https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-06-11T01:56:57
Updated: 2020-06-11T17:34:09
Reserved: 2020-05-14T00:00:00
Link: CVE-2020-12850
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-11T02:15:10.650
Modified: 2020-06-22T20:02:05.170
Link: CVE-2020-12850
JSON object: View
Redhat Information
No data.
CWE