CVE-2024-21644
HIGH NUCLEIPyload < 0.4.9 - Improper Access Control
Title source: ruleDescription
pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.
Exploits (1)
Nuclei Templates (1)
pyLoad Flask Config - Access Control
HIGHVERIFIEDby West-wise
Shodan:
html:"pyload" || http.title:"login - pyload" || http.html:"pyload" || http.title:"pyload"
FOFA:
title="login - pyload" || body="pyload" || title="pyload"
Scores
CVSS v3
7.5
EPSS
0.8651
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-284
Status
published
Products (3)
pyload/pyload
0.5.0 beta1 (2 CPE variants)
pyload/pyload
< 0.4.9
pypi/pyload-ng
0 - 0.5.0b3.dev77PyPI
Published
Jan 08, 2024
Tracked Since
Feb 18, 2026