An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pyload
Pyload pyload |
|
CPEs | cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:* | |
Vendors & Products |
Pyload
Pyload pyload |
Fri, 15 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Payload
Payload payload |
|
CPEs | cpe:2.3:a:payload:payload:*:*:*:*:*:*:*:* | |
Vendors & Products |
Payload
Payload payload |
|
Metrics |
cvssV3_1
|
Fri, 15 Nov 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79. | |
Title | Open Redirection in pyload/pyload | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-11-15T10:57:07.797Z
Updated: 2024-11-15T19:07:26.471Z
Reserved: 2024-02-05T22:31:20.037Z
Link: CVE-2024-1240
Vulnrichment
Updated: 2024-11-15T19:07:15.605Z
NVD
Status : Analyzed
Published: 2024-11-15T11:15:10.773
Modified: 2024-11-19T19:04:53.913
Link: CVE-2024-1240
Redhat
No data.