An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS14Njk4LTVoam0tdzJtNc4ABJ7D

High EPSS: 0.00209% (0.43304 Percentile) EPSS:

pyLoad is vulnerable to attacks that bypass localhost restrictions, enabling the creation of arbitrary packages

Affected Packages Affected Versions Fixed Versions
pypi:pyload-ng
PURL: pkg:pypi/pyload-ng
<= 0.5.0b3.dev88 No known fixed version
1 Dependent packages
1 Dependent repositories
2,845 Downloads last month

Affected Version Ranges

All affected versions

0.5.0a5.dev528, 0.5.0a5.dev532, 0.5.0a5.dev535, 0.5.0a5.dev536, 0.5.0a5.dev537, 0.5.0a5.dev539, 0.5.0a5.dev540, 0.5.0a5.dev545, 0.5.0a5.dev562, 0.5.0a5.dev564, 0.5.0a5.dev565, 0.5.0a6.dev570, 0.5.0a6.dev578, 0.5.0a6.dev587, 0.5.0a7.dev596, 0.5.0a8.dev602, 0.5.0a9.dev615, 0.5.0a9.dev629, 0.5.0a9.dev632, 0.5.0a9.dev641, 0.5.0a9.dev643, 0.5.0a9.dev655, 0.5.0a9.dev806, 0.5.0b1.dev1, 0.5.0b1.dev2, 0.5.0b1.dev3, 0.5.0b1.dev4, 0.5.0b1.dev5, 0.5.0b2.dev9, 0.5.0b2.dev10, 0.5.0b2.dev11, 0.5.0b2.dev12, 0.5.0b3.dev13, 0.5.0b3.dev14, 0.5.0b3.dev17, 0.5.0b3.dev18, 0.5.0b3.dev19, 0.5.0b3.dev20, 0.5.0b3.dev21, 0.5.0b3.dev22, 0.5.0b3.dev24, 0.5.0b3.dev26, 0.5.0b3.dev27, 0.5.0b3.dev28, 0.5.0b3.dev29, 0.5.0b3.dev30, 0.5.0b3.dev31, 0.5.0b3.dev32, 0.5.0b3.dev33, 0.5.0b3.dev34, 0.5.0b3.dev35, 0.5.0b3.dev38, 0.5.0b3.dev39, 0.5.0b3.dev40, 0.5.0b3.dev41, 0.5.0b3.dev42, 0.5.0b3.dev43, 0.5.0b3.dev44, 0.5.0b3.dev45, 0.5.0b3.dev46, 0.5.0b3.dev47, 0.5.0b3.dev48, 0.5.0b3.dev49, 0.5.0b3.dev50, 0.5.0b3.dev51, 0.5.0b3.dev52, 0.5.0b3.dev53, 0.5.0b3.dev54, 0.5.0b3.dev57, 0.5.0b3.dev60, 0.5.0b3.dev62, 0.5.0b3.dev64, 0.5.0b3.dev65, 0.5.0b3.dev66, 0.5.0b3.dev67, 0.5.0b3.dev68, 0.5.0b3.dev69, 0.5.0b3.dev70, 0.5.0b3.dev71, 0.5.0b3.dev72, 0.5.0b3.dev73, 0.5.0b3.dev74, 0.5.0b3.dev75, 0.5.0b3.dev76, 0.5.0b3.dev77, 0.5.0b3.dev78, 0.5.0b3.dev79, 0.5.0b3.dev80, 0.5.0b3.dev81, 0.5.0b3.dev82, 0.5.0b3.dev85, 0.5.0b3.dev87, 0.5.0b3.dev88

Summary

Any unauthenticated attacker can bypass the localhost restrictions posed by the application and utilize this to create arbitrary packages.

Details

Any unauthenticated attacker can bypass the localhost restrictions posed by the application and utilize this to create arbitrary packages. This is done by changing the Host header to the value of 127.0.0.1:9666.

PoC

The application has middleware that prevents access to several routes by checking whether the Host header has a specific value. We bypassed this restriction.

https://github.com/pyload/pyload/blob/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d/src/pyload/webui/app/blueprints/cnl_blueprint.py#L21-L36

#: decorator
def local_check(func):
    @wraps(func)
    def wrapper(*args, **kwargs):
        remote_addr = flask.request.environ.get("REMOTE_ADDR", "0")
        http_host = flask.request.environ.get("HTTP_HOST", "0")

        if remote_addr in ("127.0.0.1", "::ffff:127.0.0.1", "::1", "localhost") or http_host in (
            "127.0.0.1:9666",
            "[::1]:9666",
        ):
            return func(*args, **kwargs)
        else:
            return "Forbidden", 403

    return wrapper

Below we see that the '/flash/add' endpoint uses the middleware above.

https://github.com/pyload/pyload/blob/4159a1191ec4fe6d927e57a9c4bb8f54e16c381d/src/pyload/webui/app/blueprints/cnl_blueprint.py#L56-L58C11

@bp.route("/flash/add", methods=["POST"], endpoint="add")
@local_check
def add():

Notice how we are not authorized to access this endpoint when sending a request.
image

However, if we set the Host header to be 127.0.0.1:9666, we notice the request returns success.
image

Checking the front end as an admin, we now see that this did indeed succeed.
image

Impact

An unauthenticated user can perform actions that should only be available to authenticated users.

References: