An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79.
History

Tue, 19 Nov 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Pyload
Pyload pyload
CPEs cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*
Vendors & Products Pyload
Pyload pyload

Fri, 15 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Payload
Payload payload
CPEs cpe:2.3:a:payload:payload:*:*:*:*:*:*:*:*
Vendors & Products Payload
Payload payload
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 11:15:00 +0000

Type Values Removed Values Added
Description An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79.
Title Open Redirection in pyload/pyload
Weaknesses CWE-601
References
Metrics cvssV3_0

{'score': 4.6, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-11-15T10:57:07.797Z

Updated: 2024-11-15T19:07:26.471Z

Reserved: 2024-02-05T22:31:20.037Z

Link: CVE-2024-1240

cve-icon Vulnrichment

Updated: 2024-11-15T19:07:15.605Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T11:15:10.773

Modified: 2024-11-19T19:04:53.913

Link: CVE-2024-1240

cve-icon Redhat

No data.