CVE-2024-21645
MEDIUM NUCLEIPyload < 0.4.9 - Injection
Title source: ruleDescription
pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.
Nuclei Templates (1)
pyload - Log Injection
MEDIUMVERIFIEDby isacaya
Shodan:
title:"pyload" || http.title:"login - pyload" || http.html:"pyload" || http.title:"pyload"
FOFA:
title="login - pyload" || body="pyload" || title="pyload"
Scores
CVSS v3
5.3
EPSS
0.7132
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Details
CWE
CWE-74
Status
published
Products (3)
pyload/pyload
0.5.0 beta1 (2 CPE variants)
pyload/pyload
< 0.4.9
pypi/pyload-ng
0 - 0.5.0b3.dev77PyPI
Published
Jan 08, 2024
Tracked Since
Feb 18, 2026