vendor:
PyLoad
by:
Gabriel Lima (0xGabe)
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: PyLoad
Affected Version From: 0.5.0
Affected Version To: 0.5.0
Patch Exists: NO
Related CWE: CVE-2023-0297
CPE: a:pyload:pyload:0.5.0
Tags: huntr,packetstorm,cve,cve2023,rce,pyload,oast
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.exploit-db.com/exploits/51532, https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65/, https://nvd.nist.gov/vuln/detail/CVE-2022-1058, http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html, http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html
Nuclei Metadata: {'max-request': 2, 'verified': True, 'shodan-query': 'html:"pyload"', 'vendor': 'pyload', 'product': 'pyload'}
Platforms Tested: Ubuntu 20.04.6
2023
PyLoad 0.5.0 – Pre-auth Remote Code Execution (RCE)
This exploit allows an attacker to execute arbitrary commands on the target system without authentication. By sending a specially crafted payload to the /flash/addcrypted2 endpoint, the attacker can execute commands through the os.system() function.
Mitigation:
To mitigate this vulnerability, it is recommended to update PyLoad to a patched version or apply any security patches provided by the vendor.