PT-2024-7641 · Python +2 · Python +2
Marven11
·
Published
2024-09-09
·
Updated
2024-11-10
·
CVE-2024-39205
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
pyload-ng version 0.5.0b3.dev85
pyload (running under python3.11 or below)
Description:
The issue is related to insufficient input validation in the pyload software, allowing a remote attacker to execute arbitrary code by sending a specially crafted HTTP request. This can be achieved through a manipulated HTTP request, potentially leading to code execution. The estimated number of potentially affected devices worldwide is not specified.
Recommendations:
For pyload-ng version 0.5.0b3.dev85, consider disabling the vulnerable function until a patch is available.
For pyload running under python3.11 or below, restrict access to the vulnerable module to minimize the risk of exploitation.
Avoid using the vulnerable API endpoint until the issue is resolved.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Code Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 16
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pyload_js2py_cve_2024_39205.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape⭐ 31 🔗 6 · Exploit
- 🔥 https://github.com/Marven11/CVE-2024-39205-Pyload-RCE/tree/main⭐ 13 🔗 4 · Exploit
- 🔥 https://github.com/Marven11/CVE-2024-39205-Pyload-RCE⭐ 13 🔗 4 · Exploit
- https://osv.dev/vulnerability/GHSA-25pw-q952-x37g · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-39205 · Security Note
- https://bdu.fstec.ru/vul/2024-09082 · Security Note
- https://osv.dev/vulnerability/GHSA-r9pp-r4xf-597r · Vendor Advisory
- https://github.com/pyload/pyload⭐ 3566 🔗 734 · Note
- https://github.com/pyload/pyload/security/advisories/GHSA-r9pp-r4xf-597r⭐ 3348 🔗 713 · Note
- https://twitter.com/akaclandestine/status/1855535117629837799 · Twitter Post
- https://twitter.com/HackingTeam777/status/1852115972573864344 · Twitter Post
- https://t.me/cybersecuritytechnologies/11344 · Telegram Post
- https://t.me/cvedetector/9181 · Telegram Post
- https://github.com/advisories/GHSA-h95x-26f3-88hr · Note