7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
65.7%
An issue was discovered in proxy.php in pydio-core in Pydio through 8.2.2.
Through an unauthenticated request, it possible to evaluate malicious PHP
code by placing it on the fourth line of a .php file, as demonstrated by a
PoC.php created by the guest account, with execution via a
proxy.php?hash=…/…/…/…/…/var/lib/pydio/data/personal/guest/PoC.php
request. This is related to plugins/action.share/src/Store/ShareStore.php.
github.com/pydio/pydio-core/commits/develop/core/src/proxy.php
launchpad.net/bugs/cve/CVE-2019-9642
nvd.nist.gov/vuln/detail/CVE-2019-9642
pydio.com/en/community/releases/pydio-core/pydio-core-pydio-enterprise-823-security-release
security-tracker.debian.org/tracker/CVE-2019-9642
www.cve.org/CVERecord?id=CVE-2019-9642
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
65.7%