Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. pyload-ng
  4. ›
  5. CVE-2024-22416

CVE-2024-22416: Cross-Site Request Forgery on any API call in pyLoad may lead to admin privilege escalation

January 19, 2024 (updated October 21, 2024)

The pyload API allows any API call to be made using GET requests. Since the session cookie is not set to SameSite: strict, this opens the library up to severe attack possibilities via a Cross-Site Request Forgery (CSRF) attack. This proof of concept shows how an unauthenticated user could trick the administrator’s browser into creating a new admin user.

References

  • github.com/advisories/GHSA-pgpj-v85q-h5fm
  • github.com/pyload/pyload
  • github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e
  • github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc
  • github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm
  • github.com/pypa/advisory-database/tree/main/vulns/pyload-ng/PYSEC-2024-17.yaml
  • nvd.nist.gov/vuln/detail/CVE-2024-22416

Code Behaviors & Features

Detect and mitigate CVE-2024-22416 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.5.0b3.dev78

Fixed versions

  • 0.5.0b3.dev78

Solution

Upgrade to version 0.5.0b3.dev78 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

pypi/pyload-ng/CVE-2024-22416.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:15 +0000.