/ data / vuln_en / pyload-ng / CVE-2023-0297.yaml
CVE-2023-0297.yaml
 1  info:
 2    name: pyload-ng
 3    cve: CVE-2023-0297
 4    summary: Code Injection in pyload-ng
 5    details: |
 6      Code Injection vulnerability exists in the GitHub repository pyload/pyload prior to version 0.5.0b3.dev31.
 7      Attackers could exploit this vulnerability to execute arbitrary code.
 8    cvss: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
 9    severity: CRITICAL
10    security_advise: |
11      1. Upgrade to pyload-ng >= 0.5.0b3.dev31
12      2. Review and patch any custom code that interacts with pyload-ng to ensure secure usage
13  rule: version < "0.5.0b3.dev31"
14  references:
15    - https://nvd.nist.gov/vuln/detail/CVE-2023-0297
16    - https://github.com/pyload/pyload/commit/7d73ba7919e594d783b3411d7ddb87885aea782d
17    - https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65
18    - http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html
19    - http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html