6.4
CVSSv2

CVE-2019-10045

Published: 31/05/2019 Updated: 03/06/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 6.5 | Impact Score: 2.5 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

The "action" get_sess_id in the web application of Pydio up to and including 8.2.2 discloses the session cookie value in the response body, enabling scripts to get access to its value. This identifier can be reused by an malicious user to impersonate a user and perform actions on behalf of him/her (if the session is still active).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pydio pydio

Exploits

Pydio 8 suffers from cross site scripting, command injection, and various other vulnerabilities ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [SAUTH-2019-0002] - Pydio 8 Multiple Vulnerabilities <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Secu ...