Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-25pw-q952-x37g: Duplicate Advisory: pyload-ng vulnerable to RCE with js2py sandbox escape

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-r9pp-r4xf-597r. This link is maintained to preserve external references.

Original Description

An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request.

ghsa
#vulnerability#web#js#git#rce

Skip to content

Navigation Menu

    • GitHub Copilot

      Write better code with AI

    • Security

      Find and fix vulnerabilities

    • Actions

      Automate any workflow

    • Codespaces

      Instant dev environments

    • Issues

      Plan and track work

    • Code Review

      Manage code changes

    • Discussions

      Collaborate outside of code

    • Code Search

      Find more, search less

  • Explore

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    • Enterprise platform

      AI-powered developer platform

  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-25pw-q952-x37g

Duplicate Advisory: pyload-ng vulnerable to RCE with js2py sandbox escape

High severity GitHub Reviewed Published Oct 28, 2024 to the GitHub Advisory Database • Updated Oct 28, 2024

Withdrawn This advisory was withdrawn on Oct 28, 2024

Package

pip pyload-ng (pip)

Affected versions

<= 0.5.0b3.dev85

Description

Published by the National Vulnerability Database

Oct 28, 2024

Published to the GitHub Advisory Database

Oct 28, 2024

Last updated

Oct 28, 2024

ghsa: Latest News

GHSA-g5vw-3h65-2q3v: Access control vulnerable to user data deletion by anonynmous users