- Description
- pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote code execution can be achieved in versions prior to 0.5.0b3.dev87. A file can be downloaded to such a folder by changing the download folder to a folder in `/scripts` path and using the `/flashgot` API to download the file. This vulnerability allows an attacker with access to change the settings on a pyload server to execute arbitrary code and completely compromise the system. Version 0.5.0b3.dev87 fixes this issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 2.3
- Impact score
- 1.4
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
- Severity
- LOW
- security-advisories@github.com
- CWE-78
- Hype score
- Not currently trending
CVE-2024-47821 pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a execu... https://t.co/GkkXSDI1e7
@VulmonFeeds
26 Oct 2024
46 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
CVE-2024-47821 pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is … https://t.co/u3D6pqdpZk
@CVEnew
25 Oct 2024
609 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-47821: CRITICAL] Warning: Vulnerability in pyLoad Download Manager versions before 0.5.0b3.dev87 allows remote code execution through scripts folder. Upgrade now to stay secure.#cybersecurity,#vulnerability https://t.co/jjPQU2LZNL https://t.co/zNrr2nIc6f
@CveFindCom
25 Oct 2024
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E5A06D79-6D64-41FB-9040-17E9630DF4E9"
}
],
"operator": "OR"
}
]
}
]