logo

CVE-2024-1240 pyload-ng

Package

Manager: pip
Name: pyload-ng
Vulnerable Version: =0.5.0a5.dev528 || =0.5.0a5.dev532 || =0.5.0a5.dev535 || =0.5.0a5.dev536 || =0.5.0a5.dev537 || =0.5.0a5.dev539 || =0.5.0a5.dev540 || =0.5.0a5.dev545 || =0.5.0a5.dev562 || =0.5.0a5.dev564 || =0.5.0a5.dev565 || =0.5.0a6.dev570 || =0.5.0a6.dev578 || =0.5.0a6.dev587 || =0.5.0a7.dev596 || =0.5.0a8.dev602 || =0.5.0a9.dev615 || =0.5.0a9.dev629 || =0.5.0a9.dev632 || =0.5.0a9.dev641 || =0.5.0a9.dev643 || =0.5.0a9.dev655 || =0.5.0a9.dev806 || =0.5.0b1.dev1 || =0.5.0b1.dev2 || =0.5.0b1.dev3 || =0.5.0b1.dev4 || =0.5.0b1.dev5 || =0.5.0b2.dev10 || =0.5.0b2.dev11 || =0.5.0b2.dev12 || =0.5.0b2.dev9 || =0.5.0b3.dev13 || =0.5.0b3.dev14 || =0.5.0b3.dev17 || =0.5.0b3.dev18 || =0.5.0b3.dev19 || =0.5.0b3.dev20 || =0.5.0b3.dev21 || =0.5.0b3.dev22 || =0.5.0b3.dev24 || =0.5.0b3.dev26 || =0.5.0b3.dev27 || =0.5.0b3.dev28 || =0.5.0b3.dev29 || =0.5.0b3.dev30 || =0.5.0b3.dev31 || =0.5.0b3.dev32 || =0.5.0b3.dev33 || =0.5.0b3.dev34 || =0.5.0b3.dev35 || =0.5.0b3.dev38 || =0.5.0b3.dev39 || =0.5.0b3.dev40 || =0.5.0b3.dev41 || =0.5.0b3.dev42 || =0.5.0b3.dev43 || =0.5.0b3.dev44 || =0.5.0b3.dev45 || =0.5.0b3.dev46 || =0.5.0b3.dev47 || =0.5.0b3.dev48 || =0.5.0b3.dev49 || =0.5.0b3.dev50 || =0.5.0b3.dev51 || =0.5.0b3.dev52 || =0.5.0b3.dev53 || =0.5.0b3.dev54 || =0.5.0b3.dev57 || =0.5.0b3.dev60 || =0.5.0b3.dev62 || =0.5.0b3.dev64 || =0.5.0b3.dev65 || =0.5.0b3.dev66 || =0.5.0b3.dev67 || =0.5.0b3.dev68 || =0.5.0b3.dev69 || =0.5.0b3.dev70 || =0.5.0b3.dev71 || =0.5.0b3.dev72 || =0.5.0b3.dev73 || =0.5.0b3.dev74 || =0.5.0b3.dev75 || =0.5.0b3.dev76 || =0.5.0b3.dev77 || =0.5.0b3.dev78 || =0.5.0b3.dev79 || =0.5.0b3.dev80 || =0.5.0b3.dev81 || =0.5.0b3.dev82 || =0.5.0b3.dev85 || =0.5.0b3.dev87 || >=0 <fe94451dcc2be90b3889e2fd9d07b483c8a6dccd

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.001 pctl0.28321

Details

An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79.

Metadata

Created: 2024-11-15T11:15:00Z
Modified: 2024-11-19T22:59:28.653347Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F156
Auto approve: 1