Pydio 6.0.8 allows Authenticated SSRF during a Remote Link Feature download. An attacker can specify an intranet address in the file parameter to index.php, when sending a file to a remote server, as demonstrated by the file=http%3A%2F%2F192.168.1.2 substring.
                
            References
                    | Link | Resource | 
|---|---|
| https://heitorgouvea.me/2019/09/17/CVE-2019-15033 | Exploit Third Party Advisory | 
| https://pydio.com | Product | 
| https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ | Release Notes | 
| https://heitorgouvea.me/2019/09/17/CVE-2019-15033 | Exploit Third Party Advisory | 
| https://pydio.com | Product | 
| https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ | Release Notes | 
Configurations
                    History
                    21 Nov 2024, 04:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://heitorgouvea.me/2019/09/17/CVE-2019-15033 - Exploit, Third Party Advisory | |
| References | () https://pydio.com - Product | |
| References | () https://sourceforge.net/projects/ajaxplorer/files/pydio/stable-channel/ - Release Notes | 
Information
                Published : 2019-09-19 17:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-15033
Mitre link : CVE-2019-15033
CVE.ORG link : CVE-2019-15033
JSON object : View
Products Affected
                pydio
- pydio
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
