
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-47821 affects pyLoad, a free and open-source Download Manager, discovered in October 2024. The vulnerability exists in versions prior to 0.5.0b3.dev87, where the /.pyload/scripts folder contains scripts that are executed when certain actions are completed, such as when a download finishes (GitHub Advisory).
The vulnerability stems from the ability to manipulate the download folder settings to point to the /scripts path and utilize the /flashgot API to download malicious files. While pyLoad attempts to prevent non-local requests by checking the Host header and Referer header, these security measures can be bypassed as attackers can set arbitrary values for both headers. The vulnerability has received a CVSS v3.1 base score of 9.1 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (GitHub Advisory).
The vulnerability enables an attacker with access to change the settings on a pyload server to execute arbitrary code and completely compromise the system. This allows for full system compromise through remote code execution capabilities (GitHub Advisory).
The vulnerability has been patched in version 0.5.0b3.dev87. Users should upgrade to this version or later to mitigate the risk (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."