|
|||
Rule General Information |
---|
Release Date: | 2025-04-22 | |
Rule Name: | Pyload Cross-Site Scripting Vulnerability (CVE-2023-0488) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Pyload is a free and open-source download manager written in Python, designed to be extremely lightweight, easily expandable, and fully manageable via the web. Versions of pyload/pyload prior to 0.5.0b3.dev42 have a cross-site scripting vulnerability. Attackers can exploit this vulnerability to conduct cross-site scripting attacks. | |
Impact: | An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd |