CVE-2018-20718
In Pydio before 8.2.2, an attack is possible via PHP Object Injection because a user is allowed to use the $phpserial$a:0:{} syntax to store a preference. An attacker either needs a "public link" of a file, or access to any unprivileged user account for creation of such a link.
Published
2019-01-15T16:29:00.663
Last Modified
2024-11-21T04:02:01.520
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 9.8 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
pydio
|
pydio
|
< 8.2.2 |
Yes
|
References