CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-22416

Critical Severity
Pyload-ng_project
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.04432/1

CVE-2024-22416 in pyLoad allows unauthenticated attackers to perform actions via Cross-Site Request Forgery (CSRF). This vulnerability arises because the session cookie lacks SameSite: strict protection, enabling malicious actors to execute arbitrary API calls. pyLoad, a Python-based download manager, is susceptible to CSRF attacks due to insufficient session cookie security. With an SVRS of 77, this vulnerability is nearing critical levels, indicating a high risk of exploitation, especially given the availability of active exploits. Successful exploitation could lead to unauthorized modifications, data theft, or complete system compromise by unauthenticated users. Immediate action, including upgrading to version 0.5.0b3.dev78, is strongly advised to mitigate the potential damage from this significant security flaw.

No tags available
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2024-01-18

2024-01-29

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
nomi-sec/PoC-in-GitHubhttps://github.com/nomi-sec/PoC-in-GitHub2019-12-08
mindstorm38/ensimag-secu3a-cve-2024-22416https://github.com/mindstorm38/ensimag-secu3a-cve-2024-224162024-01-18
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppPyload-ng_projectpyload-ng

References

ReferenceLink
[email protected]https://github.com/pyload/pyload/commit/1374c824271cb7e927740664d06d2e577624ca3e
[email protected]https://github.com/pyload/pyload/commit/c7cdc18ad9134a75222974b39e8b427c4af845fc
[email protected]https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm
GITHUBhttps://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm

CWE Details

CWE IDCWE NameDescription
CWE-352Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence