CVE-2026-35459
🔴 Łataj teraz
W pyLoad występuje podatność SSRF, umożliwiająca atakującym dostęp do wewnętrznych adresów.
CVSS
9.1
EPSS
0.0%
Exploit
poc
Vendor
pyload-ng_project
Opis źródłowy (NVD)
pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user with ADD permission can bypass the SSRF fix by submitting a URL that redirects to an internal address.
exploit ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-06 20:16:28 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-20 17:01:15 UTC |
Referencje
- https://github.com/pyload/pyload/commit/33c55da084320430edfd941b60e3da0eb1be9443 (security-advisories@github.com) [Patch]
- https://github.com/pyload/pyload/security/advisories/GHSA-7gvf-3w72-p2pg (security-advisories@github.com) [Exploit, Mitigation, Vendor Advisory]