pyload-ng@0.5.0a8.dev602 vulnerabilities

The free and open-source Download Manager written in pure Python

Direct Vulnerabilities

Known vulnerabilities in the pyload-ng package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Command Injection

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Command Injection via the flashgot API and the download process. An attacker can execute arbitrary code by manipulating the download path to target the scripts directory and spoofing HTTP headers to bypass security checks. This is only exploitable if the server settings allow changing the download folder to a scripts directory and the permissions for downloaded files are improperly set.

How to fix Command Injection?

Upgrade pyload-ng to version 0.5.0b3.dev87 or higher.

[,0.5.0b3.dev87)
  • C
Improper Control of Generation of Code ('Code Injection')

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') through the /flash/addcrypted2 API endpoint that uses js2py, which is vulnerable to Code Injection. An attacker can execute arbitrary shell commands by sending a specially crafted request that bypasses the localhost-only restriction using a modified HTTP header.

Note:

Any payload-ng running under python3.11 or below is vulnerable.

pyload-ng doesn't use js2py for python3.12 or above.

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade pyload-ng to version 0.5.0b3.dev87 or higher.

[,0.5.0b3.dev87)
  • C
Unrestricted Upload of File with Dangerous Type

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Unrestricted Upload of File with Dangerous Type due to the ability to change the download folder and upload a crafted template. An attacker can execute arbitrary code on the server by uploading a malicious template file to a specified folder and then navigating to a URL that renders the uploaded template.

How to fix Unrestricted Upload of File with Dangerous Type?

Upgrade pyload-ng to version 0.5.0b3.dev85 or higher.

[,0.5.0b3.dev85)
  • M
Open Redirect

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Open Redirect via the is_safe_url function. An attacker can redirect users to malicious websites, which may be used for phishing and similar attacks by manipulating the URL input in the next variable to bypass URL validation.

How to fix Open Redirect?

Upgrade pyload-ng to version 0.5.0b3.dev79 or higher.

[,0.5.0b3.dev79)
  • C
Cross-site Request Forgery (CSRF)

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to the API accepting GET requests without proper validation. An attacker can perform unauthorized actions on behalf of a legitimate user due to the session cookie not being set to SameSite: strict.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade pyload-ng to version 0.5.0b3.dev78 or higher.

[,0.5.0b3.dev78)
  • M
Improper Output Neutralization for Logs

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Improper Output Neutralization for Logs. An attacker can inject arbitrary messages into the logs via the username, which could be used to obscure their activities or falsely implicate another individual in malicious actions.

How to fix Improper Output Neutralization for Logs?

Upgrade pyload-ng to version 0.5.0b3.dev77 or higher.

[,0.5.0b3.dev77)
  • H
Insertion of Sensitive Information into Externally-Accessible File or Directory

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Externally-Accessible File or Directory due to improper handling of a specific URL which exposes the Flask config, including the SECRET_KEY variable. An attacker can gain access to sensitive information by navigating to the exposed URL without authentication.

How to fix Insertion of Sensitive Information into Externally-Accessible File or Directory?

Upgrade pyload-ng to version 0.5.0b3.dev77 or higher.

[,0.5.0b3.dev77)
  • H
Directory Traversal

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Directory Traversal when the add_package and edit_package functions are used. An attacker can store files anywhere on the server and gain command execution by abusing scripts. This is only exploitable if a user creates a new package and then edits it to pick any arbitrary directory in the filesystem.

How to fix Directory Traversal?

Upgrade pyload-ng to version 0.5.0b3.dev75 or higher.

[,0.5.0b3.dev75)
  • M
Cross-site Scripting (XSS)

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in templates/js/packages.js, exploitable via the /collector endpoint.

How to fix Cross-site Scripting (XSS)?

Upgrade pyload-ng to version 0.5.0b3.dev42 or higher.

[,0.5.0b3.dev42)
  • H
Improper Input Validation

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Improper Input Validation in the form of insufficient SSL certificate verification in http_request.py. This allows attackers to intercept or inject HTTPS traffic between a host and a client.

How to fix Improper Input Validation?

Upgrade pyload-ng to version 0.5.0b3.dev44 or higher.

[,0.5.0b3.dev44)
  • M
Improper Input Validation

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Improper Input Validation via the cast function, which allows inserting strings as input to the Start and End time fields. Exploiting this vulnerability will cause the application to stop working.

How to fix Improper Input Validation?

Upgrade pyload-ng to version 0.5.0b3.dev40 or higher.

[0,0.5.0b3.dev40)
  • C
Arbitrary Code Injection

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Arbitrary Code Injection via the jk parameter, which passes user input, potentially including arbitrary OS commands, to pyimport.

How to fix Arbitrary Code Injection?

Upgrade pyload-ng to version 0.5.0b3.dev31 or higher.

[,0.5.0b3.dev31)
  • H
Insufficient Session Expiration

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Insufficient Session Expiration in webui/app/helpers.py, which allows an admin user whose account has been deleted to remain in an active session.

How to fix Insufficient Session Expiration?

Upgrade pyload-ng to version 0.5.0b3.dev38 or higher.

[0,0.5.0b3.dev38)
  • L
Improper Restriction of Rendered UI Layers or Frames

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Improper Restriction of Rendered UI Layers or Frames which leads to clickjacking attacks due to the lack of frame restrictions.

How to fix Improper Restriction of Rendered UI Layers or Frames?

Upgrade pyload-ng to version 0.5.0b3.dev33 or higher.

[,0.5.0b3.dev33)
  • L
Sensitive Cookie in HTTPS Session Without "Secure" Attribute

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Sensitive Cookie in HTTPS Session Without "Secure" Attribute due to missing the secure attribute for sensitive cookies in HTTPS sessions. Exploiting this vulnerability allows sending those cookies in plaintext over an HTTP session.

How to fix Sensitive Cookie in HTTPS Session Without "Secure" Attribute?

Upgrade pyload-ng to version 0.5.0b3.dev32 or higher.

[,0.5.0b3.dev32)
  • M
Prototype Pollution

pyload-ng is a The free and open-source Download Manager written in pure Python

Affected versions of this package are vulnerable to Prototype Pollution via the parseQueryString() function in String.QueryString.js, in MooTools-More.min.js.

How to fix Prototype Pollution?

Upgrade pyload-ng to version 0.5.0b3.dev41 or higher.

[,0.5.0b3.dev41)