Skip to content

Duplicate Advisory: pyload-ng vulnerable to RCE with js2py sandbox escape

High severity GitHub Reviewed Published Oct 28, 2024 to the GitHub Advisory Database • Updated Oct 28, 2024
Withdrawn This advisory was withdrawn on Oct 28, 2024

Package

pip pyload-ng (pip)

Affected versions

<= 0.5.0b3.dev85

Patched versions

None

Description

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-r9pp-r4xf-597r. This link is maintained to preserve external references.

Original Description

An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request.

References

Published by the National Vulnerability Database Oct 28, 2024
Published to the GitHub Advisory Database Oct 28, 2024
Reviewed Oct 28, 2024
Withdrawn Oct 28, 2024
Last updated Oct 28, 2024

Severity

High

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-25pw-q952-x37g

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.