diff --git a/http/cves/2024/CVE-2024-21644.yaml b/http/cves/2024/CVE-2024-21644.yaml new file mode 100644 index 0000000000..2a356aef82 --- /dev/null +++ b/http/cves/2024/CVE-2024-21644.yaml @@ -0,0 +1,48 @@ +id: CVE-2024-21644 + +info: + name: pyLoad Flask Config - Access Control + author: West-wise + severity: high + description: | + pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77. + remediation: | + Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability. + reference: + - https://github.com/advisories/GHSA-mqpq-2p68-46fv + - https://github.com/fkie-cad/nvd-json-data-feeds + - https://nvd.nist.gov/vuln/detail/CVE-2024-21644 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-21644 + cwe-id: CWE-284 + epss-score: 0.00186 + epss-percentile: 0.56007 + cpe: cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: pyload + product: pyload + shodan-query: html:"pyload" + zoomeye-query: app:"pyLoad" + tags: cve,cve2024,python,pip,pyload,access-control + +http: + - method: GET + path: + - "{{BaseURL}}/render/info.html" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "'SECRET_KEY':" + - "'pyload_session'" + condition: and + + - type: status + status: + - 200