/ data / vuln_en / pyload-ng / CVE-2024-1240.yaml
CVE-2024-1240.yaml
 1  info:
 2    name: pyload-ng
 3    cve: CVE-2024-1240
 4    summary: Open redirection vulnerability in pyload/pyload
 5    details: |
 6      An open redirection vulnerability exists in pyload/pyload version 0.5.0 due to improper handling of the 'next' parameter in the login functionality.
 7      An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities.
 8      The issue is fixed in pyload-ng 0.5.0b3.dev79.
 9    cvss: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
10    severity: MEDIUM
11    security_advise: |
12      1. Upgrade to pyload-ng >= 0.5.0b3.dev79
13      2. Review and enforce strict validation of URL parameters to prevent open redirection
14  rule: version = "0.5.0" || (version < "0.5.0b3.dev79" && version > "0")
15  references:
16    - https://nvd.nist.gov/vuln/detail/CVE-2024-1240
17    - https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd
18    - https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e