PyPi: Pyload-Ng

CVE-2024-47821

Safety vulnerability ID: 73964

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 25, 2024 Updated at Oct 30, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of pyLoad are vulnerable to path traversal via the storage_folder configuration setting. This vulnerability allows attackers to write files to arbitrary locations by manipulating the storage_folder path, potentially leading to arbitrary file writes and code execution. The vulnerability exists in the Core.init and Api.set_config_value functions where storage paths aren't properly validated. Attackers with access to configuration settings can exploit this through the web interface. Users should update to the version which implements proper path validation and restriction checks.

Affected package

pyload-ng

Latest version: 0.5.0b3.dev87

The free and open-source Download Manager written in pure Python

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application