Safety vulnerability ID: 78773
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the pyload-ng package are vulnerable to Code Injection due to improper control of code generation via a JS2PY sandbox escape in the handling of input passed to the `/flash/addcrypted2` API endpoint. The `/flash/addcrypted2` endpoint uses js2py—which suffers from a sandbox escape via CVE-2024-28397—and the endpoint’s localhost restriction can be bypassed using crafted HTTP headers, allowing execution of arbitrary shell commands within the code evaluation context. An attacker can send a request containing a shell command to the `/flash/addcrypted2` endpoint (even remotely by spoofing headers), resulting in remote code execution on the server, with high confidentiality, integrity, and availability impact.
Latest version: 0.5.0b3.dev92
The free and open-source Download Manager written in pure Python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application