Pydio 6.0.8 mishandles error reporting when a directory allows unauthenticated uploads, and the remote-upload option is used with the http://localhost:22 URL. The attacker can obtain sensitive information such as the name of the user who created that directory and other internal server information.
                
            References
                    | Link | Resource | 
|---|---|
| https://heitorgouvea.me/2019/09/17/CVE-2019-15032 | Exploit Third Party Advisory | 
| https://pydio.com | Product | 
| https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ | Release Notes | 
| https://heitorgouvea.me/2019/09/17/CVE-2019-15032 | Exploit Third Party Advisory | 
| https://pydio.com | Product | 
| https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ | Release Notes | 
Configurations
                    History
                    21 Nov 2024, 04:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://heitorgouvea.me/2019/09/17/CVE-2019-15032 - Exploit, Third Party Advisory | |
| References | () https://pydio.com - Product | |
| References | () https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ - Release Notes | 
Information
                Published : 2019-09-19 17:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-15032
Mitre link : CVE-2019-15032
CVE.ORG link : CVE-2019-15032
JSON object : View
Products Affected
                pydio
- pydio
CWE
                
                    
                        
                        CWE-209
                        
            Generation of Error Message Containing Sensitive Information
