Описание
pyLoad is a free and open-source Download Manager written in pure Python. The pyload API allows any API call to be made using GET requests. Since the session cookie is not set to SameSite: strict, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. As a result any API call can be made via a CSRF attack by an unauthenticated user. This issue has been addressed in release 0.5.0b3.dev78. All users are advised to upgrade.
Ссылки
- Patch
- Patch
- ExploitThird Party Advisory
- Patch
- Patch
- ExploitThird Party Advisory
Уязвимые конфигурации
EPSS
9.6 Critical
CVSS3
8.8 High
CVSS3
Дефекты
Связанные уязвимости
pyLoad is a free and open-source Download Manager written in pure Pyth ...
Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation
Уязвимость программного обеспечения для загрузки файлов pyload, связанная с подделкой межсайтовых запросов, позволяющая нарушителю осуществить CSRF-атаку
EPSS
9.6 Critical
CVSS3
8.8 High
CVSS3