NA

CVE-2023-0297

Published: 14/01/2023 Updated: 15/06/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Code Injection in GitHub repository pyload/pyload before 0.5.0b3.dev31.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pyload pyload

Exploits

PyLoad version 050 suffers from an unauthenticated remote code execution vulnerability ...
pyLoad versions prior to 050b3dev31 are vulnerable to Python code injection due to the pyimport functionality exposed through the js2py library An unauthenticated attacker can issue a crafted POST request to the flash/addcrypted2 endpoint to leverage this for code execution pyLoad by default runs two services, the primary of which is on port 8 ...

Github Repositories

PC(Easy) Writeup from HackTheBox

PC(Easy) 今回はHackTheBoxのPCマシーンを解いたので、その流れを解説します。 情報収集 まずはポートスキャンを行い、アクセスできるサービスがないかを探します。 そうすると、22番ポート(SSH)と50051番ポートが開いているのか分かります。 50051番ポートはgRPCという、Proto RequestとProto

Checks a single CVE or a list of CVEs against AttackerKB and optionally the National Vulnerability Database

attackerkb_checker Checks a single CVE or a list of CVEs against AttackerKB and optionally the National Vulnerability Database Usage attackerkb_checkerpy [--nvd] [--apikey=<str>] INPUT Options: -a <str>, --apikey=<str> The API key for AttackerKB --nvd Query National Vulnerability Database (NVD) for CVS ba

Hack The Box level PC

Hack The Box Level PC 拿到机器后,先nmap扫一下端口。 nmap -p- --open 101011214 # -p- 代表全部端口 # --open 只显示开放端口 ┌──(root㉿kali)-[~] └─# nmap -p- 101011214 Starting Nmap 793 ( nmaporg ) at 2023-06-05 22:49 CST Stats: 0:07:29 elapsed; 0 hosts completed (1 up), 1 undergoing SYN S

poc

pyload(CVE-2023-0297)poc A code injection vulnerability in pyLoad versions prior to 050b3dev31 leads to pre-auth RCE by abusing js2py's functionality use Usage of CVE-2023-0297_pocexe: -f string fileName:IPtxt -u string example:127001:8080

Unauthenticated Remote Code Execution in PyLoad <0.5.0b3.dev31

CVE-2023-0297 Unauthenticated Remote Code Execution in PyLoad &lt;050b3dev31 DISCLAIMER: This script is made to audit the security of systems Only use this script on your own systems or on systems you have written permission to exploit

CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad

CVE-2023-0297: Pre-auth RCE in pyLoad The Story of Finding Pre-auth RCE in pyLoad TL;DR A code injection vulnerability in pyLoad versions prior to 050b3dev31 leads to pre-auth RCE by abusing js2py's functionality You can find the report here and exploit code here Details pyLoad is an OSS download manager written in Python and manageable via web interface Its GitHub r