All the vulnerabilites related to pyload - pyload
cve-2024-22416
Vulnerability from cvelistv5
Published
2024-01-17 23:48
Modified
2025-06-17 21:19
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e | x_refsource_MISC | |
https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm" }, { "name": "https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e" }, { "name": "https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-22416", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-18T01:21:47.300988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T21:19:19.773Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev78" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` API allows any API call to be made using GET requests. Since the session cookie is not set to `SameSite: strict`, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release `0.5.0b3.dev78`. All users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.7, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-17T23:48:31.422Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm" }, { "name": "https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e" }, { "name": "https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc" } ], "source": { "advisory": "GHSA-pgpj-v85q-h5fm", "discovery": "UNKNOWN" }, "title": "Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22416", "datePublished": "2024-01-17T23:48:31.422Z", "dateReserved": "2024-01-10T15:09:55.552Z", "dateUpdated": "2025-06-17T21:19:19.773Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47821
Vulnerability from cvelistv5
Published
2024-10-25 22:48
Modified
2024-10-28 19:41
Severity ?
EPSS score ?
Summary
pyLoad vulnerable to remote code execution by download to /.pyload/scripts using /flashgot API
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev87", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47821", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T17:19:04.341270Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T19:41:54.018Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev87" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote code execution can be achieved in versions prior to 0.5.0b3.dev87. A file can be downloaded to such a folder by changing the download folder to a folder in `/scripts` path and using the `/flashgot` API to download the file. This vulnerability allows an attacker with access to change the settings on a pyload server to execute arbitrary code and completely compromise the system. Version 0.5.0b3.dev87 fixes this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T12:25:11.974Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g" } ], "source": { "advisory": "GHSA-w7hq-f2pj-c53g", "discovery": "UNKNOWN" }, "title": "pyLoad vulnerable to remote code execution by download to /.pyload/scripts using /flashgot API" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47821", "datePublished": "2024-10-25T22:48:57.950Z", "dateReserved": "2024-10-03T14:06:12.639Z", "dateUpdated": "2024-10-28T19:41:54.018Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1240
Vulnerability from cvelistv5
Published
2024-11-15 10:57
Modified
2024-11-15 19:07
Severity ?
EPSS score ?
Summary
Open Redirection in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:payload:payload:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "payload", "vendor": "payload", "versions": [ { "lessThan": "pyload-ng 0.5.0b3.dev79", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-1240", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T19:04:11.868290Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T19:07:26.471Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "pyload-ng 0.5.0b3.dev79", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the \u0027next\u0027 parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T10:57:07.797Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e" }, { "url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd" } ], "source": { "advisory": "eef9513d-ccc3-4030-b574-374c5e7b887e", "discovery": "EXTERNAL" }, "title": "Open Redirection in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2024-1240", "datePublished": "2024-11-15T10:57:07.797Z", "dateReserved": "2024-02-05T22:31:20.037Z", "dateUpdated": "2024-11-15T19:07:26.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-57751
Vulnerability from cvelistv5
Published
2025-08-21 18:27
Modified
2025-08-21 18:42
Severity ?
EPSS score ?
Summary
Denial-of-Service attack in pyLoad CNL Blueprint using dukpy.evaljs
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-9gjj-6gj7-c4wj | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-57751", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-21T18:40:14.488032Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-21T18:42:16.688Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev92" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is the free and open-source Download Manager written in pure Python. The jk parameter is received in pyLoad CNL Blueprint. Due to the lack of jk parameter verification, the jk parameter input by the user is directly determined as dykpy.evaljs(), resulting in the server CPU being fully occupied and the web-ui becoming unresponsive. This vulnerability is fixed in 0.5.0b3.dev92." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 7.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-21T18:27:04.620Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-9gjj-6gj7-c4wj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-9gjj-6gj7-c4wj" } ], "source": { "advisory": "GHSA-9gjj-6gj7-c4wj", "discovery": "UNKNOWN" }, "title": "Denial-of-Service attack in pyLoad CNL Blueprint using dukpy.evaljs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-57751", "datePublished": "2025-08-21T18:27:04.620Z", "dateReserved": "2025-08-19T15:16:22.916Z", "dateUpdated": "2025-08-21T18:42:16.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0435
Vulnerability from cvelistv5
Published
2023-01-22 00:00
Modified
2025-04-02 15:50
Severity ?
EPSS score ?
Summary
Excessive Attack Surface in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:56.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/431ea6f0371d748df66b344a05ca1a8e0310cff3" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0435", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-02T15:49:55.092645Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-02T15:50:20.297Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev41", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1125", "description": "CWE-1125 Excessive Attack Surface", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-22T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d" }, { "url": "https://github.com/pyload/pyload/commit/431ea6f0371d748df66b344a05ca1a8e0310cff3" } ], "source": { "advisory": "a3e32ad5-caee-4f43-b10a-4a876d4e3f1d", "discovery": "EXTERNAL" }, "title": "Excessive Attack Surface in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0435", "datePublished": "2023-01-22T00:00:00.000Z", "dateReserved": "2023-01-22T00:00:00.000Z", "dateUpdated": "2025-04-02T15:50:20.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-54140
Vulnerability from cvelistv5
Published
2025-07-22 21:34
Modified
2025-07-23 18:28
Severity ?
EPSS score ?
Summary
pyLoad has Path Traversal Vulnerability in json/upload Endpoint that allows Arbitrary File Write
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54140", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-23T18:28:30.704049Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-23T18:28:44.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003e= 0.5.0b3.dev89, \u003c 0.5.0b3.dev90" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is a free and open-source Download Manager written in pure Python. In version 0.5.0b3.dev89, an authenticated path traversal vulnerability exists in the /json/upload endpoint of pyLoad. By manipulating the filename of an uploaded file, an attacker can traverse out of the intended upload directory, allowing them to write arbitrary files to any location on the system accessible to the pyLoad process. This may lead to: Remote Code Execution (RCE), local privilege escalation, system-wide compromise, persistence, and backdoors. This is fixed in version 0.5.0b3.dev90." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-22T21:34:30.750Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-xqpg-92fq-grfg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-xqpg-92fq-grfg" }, { "name": "https://github.com/pyload/pyload/commit/fc4b136e9c4e7dcbb8e467ae802cb2c3f70a71b0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/fc4b136e9c4e7dcbb8e467ae802cb2c3f70a71b0" }, { "name": "https://github.com/pyload/pyload/blob/df094db67ec6e25294a9ac0ddb4375fd7fb9ba00/src/pyload/webui/app/blueprints/json_blueprint.py#L109", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/blob/df094db67ec6e25294a9ac0ddb4375fd7fb9ba00/src/pyload/webui/app/blueprints/json_blueprint.py#L109" } ], "source": { "advisory": "GHSA-xqpg-92fq-grfg", "discovery": "UNKNOWN" }, "title": "pyLoad has Path Traversal Vulnerability in json/upload Endpoint that allows Arbitrary File Write" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54140", "datePublished": "2025-07-22T21:34:30.750Z", "dateReserved": "2025-07-16T23:53:40.511Z", "dateUpdated": "2025-07-23T18:28:44.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0509
Vulnerability from cvelistv5
Published
2023-01-26 00:00
Modified
2025-03-31 16:45
Severity ?
EPSS score ?
Summary
Improper Certificate Validation in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:49.018Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/a9098bdf7406e6faf9df3da6ff2d584e90c13bbb" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0509", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:45:22.563280Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:45:30.444Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev44", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-26T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839" }, { "url": "https://github.com/pyload/pyload/commit/a9098bdf7406e6faf9df3da6ff2d584e90c13bbb" } ], "source": { "advisory": "a370e0c2-a41c-4871-ad91-bc6f31a8e839", "discovery": "EXTERNAL" }, "title": "Improper Certificate Validation in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0509", "datePublished": "2023-01-26T00:00:00.000Z", "dateReserved": "2023-01-26T00:00:00.000Z", "dateUpdated": "2025-03-31T16:45:30.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21644
Vulnerability from cvelistv5
Published
2024-01-08 13:20
Modified
2025-06-17 20:39
Severity ?
EPSS score ?
Summary
pyLoad unauthenticated flask configuration leakage
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv" }, { "name": "https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-21644", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-09T19:55:57.324511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:39:15.676Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev77" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T13:20:55.182Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv" }, { "name": "https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/bb22063a875ffeca357aaf6e2edcd09705688c40" } ], "source": { "advisory": "GHSA-mqpq-2p68-46fv", "discovery": "UNKNOWN" }, "title": "pyLoad unauthenticated flask configuration leakage" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-21644", "datePublished": "2024-01-08T13:20:55.182Z", "dateReserved": "2023-12-29T03:00:44.958Z", "dateUpdated": "2025-06-17T20:39:15.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0057
Vulnerability from cvelistv5
Published
2023-01-05 00:00
Modified
2025-04-09 15:33
Severity ?
EPSS score ?
Summary
Improper Restriction of Rendered UI Layers or Frames in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/bd2a31b7de54570b919aa1581d486e6ee18c0f64" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0057", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:23:29.067149Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T15:33:56.198Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev33", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Restriction of Rendered UI Layers or Frames in GitHub repository pyload/pyload prior to 0.5.0b3.dev33." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1021", "description": "CWE-1021 Improper Restriction of Rendered UI Layers or Frames", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-05T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d" }, { "url": "https://github.com/pyload/pyload/commit/bd2a31b7de54570b919aa1581d486e6ee18c0f64" } ], "source": { "advisory": "12b64f91-d048-490c-94b0-37514b6d694d", "discovery": "EXTERNAL" }, "title": "Improper Restriction of Rendered UI Layers or Frames in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0057", "datePublished": "2023-01-05T00:00:00.000Z", "dateReserved": "2023-01-04T00:00:00.000Z", "dateUpdated": "2025-04-09T15:33:56.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0227
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2025-04-08 13:39
Severity ?
EPSS score ?
Summary
Insufficient Session Expiration in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/af3101d7-fea6-463a-b7e4-a48be219e31b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/c035714c0596b704b11af0f8a669352f128ad2d9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0227", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T13:38:58.951499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T13:39:15.554Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev36", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient Session Expiration in GitHub repository pyload/pyload prior to 0.5.0b3.dev36." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-12T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/af3101d7-fea6-463a-b7e4-a48be219e31b" }, { "url": "https://github.com/pyload/pyload/commit/c035714c0596b704b11af0f8a669352f128ad2d9" } ], "source": { "advisory": "af3101d7-fea6-463a-b7e4-a48be219e31b", "discovery": "EXTERNAL" }, "title": "Insufficient Session Expiration in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0227", "datePublished": "2023-01-12T00:00:00.000Z", "dateReserved": "2023-01-12T00:00:00.000Z", "dateUpdated": "2025-04-08T13:39:15.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32880
Vulnerability from cvelistv5
Published
2024-04-26 17:30
Modified
2024-08-02 02:20
Severity ?
EPSS score ?
Summary
pyLoad allows upload to arbitrary folder lead to RCE
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:pyload:pyload:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "*" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32880", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-26T18:47:38.741143Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:11.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:20:35.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c= 4.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "pyload is an open-source Download Manager written in pure Python. An authenticated user can change the download folder and upload a crafted template to the specified folder lead to remote code execution. There is no fix available at the time of publication." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-26T17:30:24.685Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f" } ], "source": { "advisory": "GHSA-3f7w-p8vr-4v5f", "discovery": "UNKNOWN" }, "title": "pyLoad allows upload to arbitrary folder lead to RCE" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32880", "datePublished": "2024-04-26T17:30:24.685Z", "dateReserved": "2024-04-19T14:07:11.230Z", "dateUpdated": "2024-08-02T02:20:35.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-55156
Vulnerability from cvelistv5
Published
2025-08-11 22:21
Modified
2025-08-12 15:49
Severity ?
EPSS score ?
Summary
PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/commit/134edcdf6e2a10c393743c254da3d9d90b74258f | x_refsource_MISC | |
https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55156", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T15:49:23.306603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T15:49:56.057Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev91" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 7.8, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T22:21:52.225Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf" }, { "name": "https://github.com/pyload/pyload/commit/134edcdf6e2a10c393743c254da3d9d90b74258f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/134edcdf6e2a10c393743c254da3d9d90b74258f" }, { "name": "https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271" } ], "source": { "advisory": "GHSA-pwh4-6r3m-j2rf", "discovery": "UNKNOWN" }, "title": "PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55156", "datePublished": "2025-08-11T22:21:52.225Z", "dateReserved": "2025-08-07T18:27:23.306Z", "dateUpdated": "2025-08-12T15:49:56.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0297
Vulnerability from cvelistv5
Published
2023-01-14 00:00
Modified
2025-04-07 18:41
Severity ?
EPSS score ?
Summary
Code Injection in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:54.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/7d73ba7919e594d783b3411d7ddb87885aea782d" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0297", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T18:41:46.711629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:41:55.800Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev31", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-15T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65" }, { "url": "https://github.com/pyload/pyload/commit/7d73ba7919e594d783b3411d7ddb87885aea782d" }, { "url": "http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html" }, { "url": "http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html" } ], "source": { "advisory": "3fd606f7-83e1-4265-b083-2e1889a05e65", "discovery": "EXTERNAL" }, "title": " Code Injection in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0297", "datePublished": "2023-01-14T00:00:00.000Z", "dateReserved": "2023-01-14T00:00:00.000Z", "dateUpdated": "2025-04-07T18:41:55.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-7346
Vulnerability from cvelistv5
Published
2025-07-08 07:05
Modified
2025-07-08 14:14
Severity ?
EPSS score ?
Summary
Any unauthenticated attacker can bypass the localhost
restrictions posed by the application and utilize this to create
arbitrary packages
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-7346", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T14:13:19.959797Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-08T14:14:15.199Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Pyload", "vendor": "Pyload", "versions": [ { "lessThanOrEqual": "0.5.0b3.dev77", "status": "affected", "version": "0", "versionType": "Below 0.5.0b3.dev77" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAny unauthenticated attacker can bypass the localhost \nrestrictions posed by the application and utilize this to create \narbitrary packages\u003c/p\u003e" } ], "value": "Any unauthenticated attacker can bypass the localhost \nrestrictions posed by the application and utilize this to create \narbitrary packages" } ], "impacts": [ { "capecId": "CAPEC-180", "descriptions": [ { "lang": "en", "value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281 Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-08T07:11:38.686Z", "orgId": "1c6b5737-9389-4011-8117-89fa251edfb2", "shortName": "Toreon" }, "references": [ { "url": "https://github.com/pyload/pyload/security/advisories/GHSA-x698-5hjm-w2m5" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "1c6b5737-9389-4011-8117-89fa251edfb2", "assignerShortName": "Toreon", "cveId": "CVE-2025-7346", "datePublished": "2025-07-08T07:05:11.861Z", "dateReserved": "2025-07-08T07:01:59.287Z", "dateUpdated": "2025-07-08T14:14:15.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-54802
Vulnerability from cvelistv5
Published
2025-08-05 00:06
Modified
2025-08-05 14:29
Severity ?
EPSS score ?
Summary
pyLoad CNL Blueprint is vulnerable to Path Traversal through `dlc_path` leading to Remote Code Execution (RCE)
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-48rp-jc79-2264 | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/pull/4596 | x_refsource_MISC | |
https://github.com/pyload/pyload/commit/70a44fe02c03bce92337b5d370d2a45caa4de3d4 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54802", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-05T14:29:40.016514Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-05T14:29:43.201Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-48rp-jc79-2264" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003e= 0.5.0b3.dev89, \u003c 0.5.0b3.dev90" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing unauthenticated attackers to write arbitrary files outside the designated storage directory. This can be abused to overwrite critical system files, including cron jobs and systemd services, leading to privilege escalation and remote code execution as root. This issue is fixed in version 0.5.0b3.dev90." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-05T00:06:48.834Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-48rp-jc79-2264", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-48rp-jc79-2264" }, { "name": "https://github.com/pyload/pyload/pull/4596", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/pull/4596" }, { "name": "https://github.com/pyload/pyload/commit/70a44fe02c03bce92337b5d370d2a45caa4de3d4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/70a44fe02c03bce92337b5d370d2a45caa4de3d4" } ], "source": { "advisory": "GHSA-48rp-jc79-2264", "discovery": "UNKNOWN" }, "title": "pyLoad CNL Blueprint is vulnerable to Path Traversal through `dlc_path` leading to Remote Code Execution (RCE)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54802", "datePublished": "2025-08-05T00:06:48.834Z", "dateReserved": "2025-07-29T16:50:28.395Z", "dateUpdated": "2025-08-05T14:29:43.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0434
Vulnerability from cvelistv5
Published
2023-01-22 00:00
Modified
2025-04-02 15:51
Severity ?
EPSS score ?
Summary
Improper Input Validation in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:56.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/a2b1eb1028f45ac58dea5f58593c1d3db2b4a104" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0434", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-02T15:51:18.168203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-02T15:51:41.649Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev40", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-22T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4" }, { "url": "https://github.com/pyload/pyload/commit/a2b1eb1028f45ac58dea5f58593c1d3db2b4a104" } ], "source": { "advisory": "7d9332d8-6997-483b-9fb9-bcf2ae01dad4", "discovery": "EXTERNAL" }, "title": "Improper Input Validation in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0434", "datePublished": "2023-01-22T00:00:00.000Z", "dateReserved": "2023-01-21T00:00:00.000Z", "dateUpdated": "2025-04-02T15:51:41.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47890
Vulnerability from cvelistv5
Published
2024-01-08 00:00
Modified
2025-06-03 14:39
Severity ?
EPSS score ?
Summary
pyLoad 0.5.0 is vulnerable to Unrestricted File Upload.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:16:43.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://pyload.com" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-47890", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-09T23:56:34.089021Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-03T14:39:20.831Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad 0.5.0 is vulnerable to Unrestricted File Upload." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T19:43:20.086Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "http://pyload.com" }, { "url": "https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-47890", "datePublished": "2024-01-08T00:00:00.000Z", "dateReserved": "2023-11-13T00:00:00.000Z", "dateUpdated": "2025-06-03T14:39:20.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-53890
Vulnerability from cvelistv5
Published
2025-07-14 23:57
Modified
2025-07-15 19:48
Severity ?
EPSS score ?
Summary
pyLoad vulnerable to remote code execution through js2py onCaptchaResult
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53 | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/pull/4586 | x_refsource_MISC | |
https://github.com/pyload/pyload/commit/909e5c97885237530d1264cfceb5555870eb9546 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53890", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-15T13:24:23.757076Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-15T19:48:50.099Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev89" } ] } ], "descriptions": [ { "lang": "en", "value": "pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad\u2019s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system remote code execution. Commit 909e5c97885237530d1264cfceb5555870eb9546, the patch for the issue, is included in version 0.5.0b3.dev89." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-14T23:57:20.830Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53" }, { "name": "https://github.com/pyload/pyload/pull/4586", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/pull/4586" }, { "name": "https://github.com/pyload/pyload/commit/909e5c97885237530d1264cfceb5555870eb9546", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/909e5c97885237530d1264cfceb5555870eb9546" } ], "source": { "advisory": "GHSA-8w3f-4r8f-pf53", "discovery": "UNKNOWN" }, "title": "pyLoad vulnerable to remote code execution through js2py onCaptchaResult" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53890", "datePublished": "2025-07-14T23:57:09.574Z", "dateReserved": "2025-07-11T19:05:23.824Z", "dateUpdated": "2025-07-15T19:48:50.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0055
Vulnerability from cvelistv5
Published
2023-01-04 00:00
Modified
2025-04-09 15:32
Severity ?
EPSS score ?
Summary
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/7b53b8d43c2c072b457dcd19c8a09bcfc3721703" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0055", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:24:08.895936Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-09T15:32:47.320Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev32", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-614", "description": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-04T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce" }, { "url": "https://github.com/pyload/pyload/commit/7b53b8d43c2c072b457dcd19c8a09bcfc3721703" } ], "source": { "advisory": "ed88e240-99ff-48a1-bf32-8e1ef5f13cce", "discovery": "EXTERNAL" }, "title": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0055", "datePublished": "2023-01-04T00:00:00.000Z", "dateReserved": "2023-01-04T00:00:00.000Z", "dateUpdated": "2025-04-09T15:32:47.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0488
Vulnerability from cvelistv5
Published
2023-01-26 00:00
Modified
2025-03-31 16:47
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - Stored in pyload/pyload
References
Impacted products
▼ | Vendor | Product |
---|---|---|
pyload | pyload/pyload |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:56.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a" }, { "tags": [ "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0488", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:46:52.053308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:47:00.638Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload/pyload", "vendor": "pyload", "versions": [ { "lessThan": "0.5.0b3.dev42", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-26T00:00:00.000Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a" }, { "url": "https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd" } ], "source": { "advisory": "4311d8d7-682c-4f2a-b92c-3f9f1a36255a", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Stored in pyload/pyload" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0488", "datePublished": "2023-01-26T00:00:00.000Z", "dateReserved": "2023-01-25T00:00:00.000Z", "dateUpdated": "2025-03-31T16:47:00.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21645
Vulnerability from cvelistv5
Published
2024-01-08 13:20
Modified
2024-11-14 17:38
Severity ?
EPSS score ?
Summary
pyLoad Log Injection
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:35.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr" }, { "name": "https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-21645", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T21:13:17.262265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T17:38:32.866Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c 0.5.0b3.dev77" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker\u2019s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T13:20:47.181Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr" }, { "name": "https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d" } ], "source": { "advisory": "GHSA-ghmw-rwh8-6qmr", "discovery": "UNKNOWN" }, "title": "pyLoad Log Injection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-21645", "datePublished": "2024-01-08T13:20:47.181Z", "dateReserved": "2023-12-29T03:00:44.958Z", "dateUpdated": "2024-11-14T17:38:32.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24808
Vulnerability from cvelistv5
Published
2024-02-06 03:17
Modified
2025-05-09 16:31
Severity ?
EPSS score ?
Summary
pyLoad open redirect vulnerability due to improper validation of the is_safe_url function
References
▼ | URL | Tags |
---|---|---|
https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5 | x_refsource_CONFIRM | |
https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5" }, { "name": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-24808", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-06T16:57:09.022075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-09T16:31:14.196Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "pyload", "vendor": "pyload", "versions": [ { "status": "affected", "version": "\u003c= 0.4.20" } ] } ], "descriptions": [ { "lang": "en", "value": "pyLoad is an open-source Download Manager written in pure Python. There is an open redirect vulnerability due to incorrect validation of input values when redirecting users after login. pyLoad is validating URLs via the `get_redirect_url` function when redirecting users at login. This vulnerability has been patched with commit fe94451." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-06T03:17:16.532Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5" }, { "name": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd" } ], "source": { "advisory": "GHSA-g3cm-qg2v-2hj5", "discovery": "UNKNOWN" }, "title": "pyLoad open redirect vulnerability due to improper validation of the is_safe_url function" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24808", "datePublished": "2024-02-06T03:17:16.532Z", "dateReserved": "2024-01-31T16:28:17.941Z", "dateUpdated": "2025-05-09T16:31:14.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }