CVE-2024-47821

CRITICAL

pyLoad <0.5.0b3.dev87 - RCE

Title source: llm
STIX 2.1

Description

pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote code execution can be achieved in versions prior to 0.5.0b3.dev87. A file can be downloaded to such a folder by changing the download folder to a folder in `/scripts` path and using the `/flashgot` API to download the file. This vulnerability allows an attacker with access to change the settings on a pyload server to execute arbitrary code and completely compromise the system. Version 0.5.0b3.dev87 fixes this issue.

References (1)

Core 1
Core References

Scores

CVSS v3 9.1
EPSS 0.0181
EPSS Percentile 82.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (2)
pyload/pyload 0.5.0
pypi/pyload-ng 0 - 0.5.0b3.dev87PyPI
Published Oct 25, 2024
Tracked Since Feb 18, 2026