Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6px9-j4qr-xfjw

Опубликовано: 05 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

pyLoad has an Arbitrary File Write via Path Traversal in edit_package()

The edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences.

Exploitation

An authenticated user with MODIFY permission can bypass the sanitization by submitting a payload such as: pack_folder=..././..././..././tmp

After the single-pass replacement, this becomes: ../../../tmp

Because the traversal sequences are not properly validated, the resulting normalized path escapes the intended storage directory and writes files to /tmp or other locations.

Пакеты

Наименование

pyload-ng

pip
Затронутые версииВерсия исправления

>= 0.5.0b3.dev13, <= 0.5.0b3.dev96

Отсутствует

EPSS

Процентиль: 4%
0.00016
Низкий

7.1 High

CVSS3

Дефекты

CWE-23

Связанные уязвимости

CVSS3: 7.1
nvd
23 дня назад

pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.

CVSS3: 7.1
debian
23 дня назад

pyLoad is a free and open-source download manager written in Python. F ...

EPSS

Процентиль: 4%
0.00016
Низкий

7.1 High

CVSS3

Дефекты

CWE-23