Unauthenticated Flask Config Exposure in pyLoad
CVE-2024-21644
7.5HIGH
Summary
A vulnerability exists in the pyLoad Download Manager, a well-known open-source application developed in Python. This flaw enables any unauthenticated user to access a specific URL, which can expose critical Flask configuration information. This includes the sensitive SECRET_KEY
variable, which is crucial for maintaining the integrity and security of the application. This vulnerability has been addressed in version 0.5.0b3.dev77, highlighting the necessity for users to update their installations to mitigate potential security risks.
Affected Version(s)
pyload < 0.5.0b3.dev77
References
EPSS Score
87% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved