Vulnerability Description
The ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin's configuration options, allowing arbitrary shell commands to be entered that result in command execution on the underlying operating system, with the privileges of the local user running the web server. The attacker must be authenticated into the application with an administrator user account in order to be able to edit the affected plugin configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pydio | Pydio | <= 8.2.2 |
Related Weaknesses (CWE)
References
- https://www.secureauth.com/labs/advisoriesExploitThird Party Advisory
- https://www.secureauth.com/labs/advisoriesExploitThird Party Advisory
FAQ
What is CVE-2019-10048?
CVE-2019-10048 is a vulnerability with a CVSS score of 7.2 (HIGH). The ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin's configuration options, al...
How severe is CVE-2019-10048?
CVE-2019-10048 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10048?
Check the references section above for vendor advisories and patch information. Affected products include: Pydio Pydio.