Unauthenticated Flask Config Exposure in pyLoad
CVE-2024-21644

7.5HIGH

Key Information:

Vendor
pyload
Status
Vendor
CVE Published:
8 January 2024

Summary

A vulnerability exists in the pyLoad Download Manager, a well-known open-source application developed in Python. This flaw enables any unauthenticated user to access a specific URL, which can expose critical Flask configuration information. This includes the sensitive SECRET_KEY variable, which is crucial for maintaining the integrity and security of the application. This vulnerability has been addressed in version 0.5.0b3.dev77, highlighting the necessity for users to update their installations to mitigate potential security risks.

Affected Version(s)

pyload < 0.5.0b3.dev77

References

EPSS Score

87% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.