Pydio

Pydio

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 17.04.2025 00:00:00
  • Zuletzt bearbeitet 25.06.2025 18:49:27

Pydio Core <= 8.2.5 is vulnerable to Cross Site Scripting (XSS) via the New URL Bookmark feature.

  • EPSS 4.37%
  • Veröffentlicht 17.03.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:38:30

A problem was found in Pydio Core before 8.2.4 and Pydio Enterprise before 8.2.4. A PHP object injection is present in the page plugins/uploader.http/HttpDownload.php. An authenticated user with basic privileges can inject objects and achieve remote ...

  • EPSS 4.37%
  • Veröffentlicht 17.03.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:38:30

A problem was found in Pydio Core before 8.2.4 and Pydio Enterprise before 8.2.4. A PHP object injection is present in the page plugins/core.access/src/RecycleBinManager.php. An authenticated user with basic privileges can inject objects and achieve ...

  • EPSS 7.06%
  • Veröffentlicht 11.02.2020 12:15:11
  • Zuletzt bearbeitet 21.11.2024 01:55:14

Ajaxeplorer before 5.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) archive_name parameter to the Power FS module (plugins/action.powerfs/class.PowerFSController.php), a (2) file name to the getTrustSize...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 19.09.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:27:54

Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 ...

Exploit
  • EPSS 0.44%
  • Veröffentlicht 19.09.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:27:54

Pydio 6.0.8 mishandles error reporting when a directory allows unauthenticated uploads, and the remote-upload option is used with the http://localhost:22 URL. The attacker can obtain sensitive information such as the name of the user who created that...

  • EPSS 2.02%
  • Veröffentlicht 05.06.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:02

An issue was discovered in proxy.php in pydio-core in Pydio through 8.2.2. Through an unauthenticated request, it possible to evaluate malicious PHP code by placing it on the fourth line of a .php file, as demonstrated by a PoC.php created by the gue...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 31.05.2019 22:29:01
  • Zuletzt bearbeitet 21.11.2024 04:18:16

A stored XSS vulnerability exists in the web application of Pydio through 8.2.2 that can be exploited by levering the file upload and file preview features of the application. An authenticated attacker can upload an HTML file containing JavaScript co...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 31.05.2019 22:29:01
  • Zuletzt bearbeitet 21.11.2024 04:18:16

It is possible for an attacker with regular user access to the web application of Pydio through 8.2.2 to trick an administrator user into opening a link shared through the application, that in turn opens a shared file that contains JavaScript code (t...

Exploit
  • EPSS 2.11%
  • Veröffentlicht 31.05.2019 22:29:01
  • Zuletzt bearbeitet 21.11.2024 04:18:16

The ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin's configuration options, allowing arbitrary shell commands to be entered that...