.. / CVE-2024-21644

Exploit for pyLoad Flask Config - Access Control (CVE-2024-21644)

Description:

pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the SECRET_KEY variable. This issue has been patched in version 0.5.0b3.dev77.

Nuclei Template

View the template here CVE-2024-21644.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-21644.yaml
Copy

References:

https://github.com/fkie-cad/nvd-json-data-feeds
https://github.com/advisories/GHSA-mqpq-2p68-46fv
https://github.com/nomi-sec/PoC-in-GitHub
https://nvd.nist.gov/vuln/detail/CVE-2024-21644
https://github.com/ltranquility/CVE-2024-21644-Poc