Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-388c-v74f-rw5m

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.6

Описание

Pydio version 8.2.1 and prior contains an Unvalidated user input leading to Remote Code Execution (RCE) vulnerability in plugins/action.antivirus/AntivirusScanner.php: Line 124, scanNow($nodeObject) that can result in An attacker gaining admin access and can then execute arbitrary commands on the underlying OS. This attack appear to be exploitable via The attacker edits the Antivirus Command in the antivirus plugin, and executes the payload by uploading any file within Pydio.

Pydio version 8.2.1 and prior contains an Unvalidated user input leading to Remote Code Execution (RCE) vulnerability in plugins/action.antivirus/AntivirusScanner.php: Line 124, scanNow($nodeObject) that can result in An attacker gaining admin access and can then execute arbitrary commands on the underlying OS. This attack appear to be exploitable via The attacker edits the Antivirus Command in the antivirus plugin, and executes the payload by uploading any file within Pydio.

EPSS

Процентиль: 86%
0.02815
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 6.6
nvd
больше 7 лет назад

Pydio version 8.2.1 and prior contains an Unvalidated user input leading to Remote Code Execution (RCE) vulnerability in plugins/action.antivirus/AntivirusScanner.php: Line 124, scanNow($nodeObject) that can result in An attacker gaining admin access and can then execute arbitrary commands on the underlying OS. This attack appear to be exploitable via The attacker edits the Antivirus Command in the antivirus plugin, and executes the payload by uploading any file within Pydio.

CVSS3: 6.6
debian
больше 7 лет назад

Pydio version 8.2.1 and prior contains an Unvalidated user input leadi ...

EPSS

Процентиль: 86%
0.02815
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-20