Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-21645Injection in Pyload

CWE-74Injection5 documents5 sources
Severity
5.3MEDIUMNVD
EPSS
71.3%
top 1.28%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 8

Description

pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

CVEListV5pyload/pyload< 0.5.0b3.dev77
PyPIpyload-ng_project/pyload-ng< 0.5.0b3.dev77
NVDpyload/pyload0.4.9+1

Patches

🔴Vulnerability Details

3
OSV
pyload Log Injection vulnerability2024-01-08
CVEList
pyLoad Log Injection2024-01-08
GHSA
pyload Log Injection vulnerability2024-01-08

💥Exploits & PoCs

1
Nuclei
pyload - Log Injection
CVE-2024-21645 — Injection in Pyload | cvebase