Sensitive Cookie in HTTPS Session Without "Secure" Attribute Affecting pyload-ng package, versions [,0.5.0b3.dev32)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.07% (32nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PYLOADNG-3225112
- published 5 Jan 2023
- disclosed 5 Jan 2023
- credit bAu
Introduced: 5 Jan 2023
CVE-2023-0055 Open this link in a new tabHow to fix?
Upgrade pyload-ng
to version 0.5.0b3.dev32 or higher.
Overview
pyload-ng is a The free and open-source Download Manager written in pure Python
Affected versions of this package are vulnerable to Sensitive Cookie in HTTPS Session Without "Secure" Attribute due to missing the secure
attribute for sensitive cookies in HTTPS sessions. Exploiting this vulnerability allows sending those cookies in plaintext over an HTTP session.
PoC
HTTP/1.1 200 OK
Content-Type: application/json
Content-Length: 107
Vary: Accept-Encoding
Set-Cookie: pyload_session=28d0985f-aea1-490b-9954-866be697d8ad; Expires=Fri, 03 Feb 2023 05:47:17 GMT; HttpOnly; Path=/; SameSite=Lax
Connection: close
Date: Tue, 03 Jan 2023 05:47:17 GMT
Server: Cheroot/8.6.0
References
CVSS Scores
version 3.1