Description
It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-2112 | It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her). |
References
| Link | Providers |
|---|---|
| https://www.secureauth.com/labs/advisories |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:10:09.306Z
Reserved: 2019-03-25T00:00:00.000Z
Link: CVE-2019-10049
No data.
Status : Modified
Published: 2019-05-31T22:29:01.130
Modified: 2024-11-21T04:18:16.917
Link: CVE-2019-10049
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD