Описание
PyLoad vulnerable to SQL Injection via API /json/add_package in add_links parameter
Summary
The parameter add_links in the API /json/add_package is vulnerable to SQL Injection. SQL injection vulnerabilities can lead to sensitive data leakage.
Details
- Affected file:https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271
- Affected code:
statuses is constructed from data, and data is the value of the add_links parameter entered by the user through /json/add_packge. Because {statuses} is directly spliced into the SQL statement, it leads to the SQL injection vulnerability.
- Vulnerability Chain
PoC
Remediation
Impact
Attackers can modify or delete data in the database, causing data errors or loss.
Пакеты
pyload-ng
< 0.5.0b3.dev91
0.5.0b3.dev91
Связанные уязвимости
pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91.
pyLoad is the free and open-source Download Manager written in pure Py ...