Vulnerabilities (CVE)

Filtered by vendor Pydio Subscribe
Filtered by product Pydio
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-14772 1 Pydio 1 Pydio 2020-08-24 9.0 HIGH 7.2 HIGH
Pydio 4.2.1 through 8.2.1 has an authenticated remote code execution vulnerability in which an attacker with administrator access to the web application can execute arbitrary code on the underlying system via Command Injection.
CVE-2019-10049 1 Pydio 1 Pydio 2020-08-24 4.9 MEDIUM 7.3 HIGH
It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (that is executed in the context of the victim user to obtain sensitive information such as session identifiers and perform actions on behalf of him/her).
CVE-2019-20453 1 Pydio 1 Pydio 2020-08-24 6.5 MEDIUM 8.8 HIGH
A problem was found in Pydio Core before 8.2.4 and Pydio Enterprise before 8.2.4. A PHP object injection is present in the page plugins/uploader.http/HttpDownload.php. An authenticated user with basic privileges can inject objects and achieve remote code execution.
CVE-2019-20452 1 Pydio 1 Pydio 2020-08-24 6.5 MEDIUM 8.8 HIGH
A problem was found in Pydio Core before 8.2.4 and Pydio Enterprise before 8.2.4. A PHP object injection is present in the page plugins/core.access/src/RecycleBinManager.php. An authenticated user with basic privileges can inject objects and achieve remote code execution.
CVE-2019-15033 1 Pydio 1 Pydio 2019-09-20 4.0 MEDIUM 7.7 HIGH
Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 substring.
CVE-2019-10048 1 Pydio 1 Pydio 2019-06-03 9.0 HIGH 7.2 HIGH
The ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin's configuration options, allowing arbitrary shell commands to be entered that result in command execution on the underlying operating system, with the privileges of the local user running the web server. The attacker must be authenticated into the application with an administrator user account in order to be able to edit the affected plugin configuration.