PT-2024-7641 · Python +2 · Python +2

Marven11

·

Published

2024-09-09

·

Updated

2024-11-10

·

CVE-2024-39205

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions:

pyload-ng version 0.5.0b3.dev85

pyload (running under python3.11 or below)

Description:

The issue is related to insufficient input validation in the pyload software, allowing a remote attacker to execute arbitrary code by sending a specially crafted HTTP request. This can be achieved through a manipulated HTTP request, potentially leading to code execution. The estimated number of potentially affected devices worldwide is not specified.

Recommendations:

For pyload-ng version 0.5.0b3.dev85, consider disabling the vulnerable function until a patch is available.

For pyload running under python3.11 or below, restrict access to the vulnerable module to minimize the risk of exploitation.

Avoid using the vulnerable API endpoint until the issue is resolved.

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2024-09082
CVE-2024-39205
GHSA-25PW-Q952-X37G
GHSA-R9PP-R4XF-597R

Affected Products

Pyload
Pyload-Ng
Python