From a728c6d0a3b7cae5ebfabe29477543fab9968b91 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 6 Feb 2024 04:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/24xxx/CVE-2024-24808.json | 81 ++++++++++++++++++++++++++++++++-- 1 file changed, 77 insertions(+), 4 deletions(-) diff --git a/2024/24xxx/CVE-2024-24808.json b/2024/24xxx/CVE-2024-24808.json index 6bcd9e7b96c..bc4a866ac02 100644 --- a/2024/24xxx/CVE-2024-24808.json +++ b/2024/24xxx/CVE-2024-24808.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-24808", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "pyLoad is an open-source Download Manager written in pure Python. There is an open redirect vulnerability due to incorrect validation of input values when redirecting users after login. pyLoad is validating URLs via the `get_redirect_url` function when redirecting users at login. This vulnerability has been patched with commit fe94451." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "cweId": "CWE-601" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "pyload", + "product": { + "product_data": [ + { + "product_name": "pyload", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "<= 0.4.20" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5", + "refsource": "MISC", + "name": "https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5" + }, + { + "url": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd", + "refsource": "MISC", + "name": "https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd" + } + ] + }, + "source": { + "advisory": "GHSA-g3cm-qg2v-2hj5", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "version": "3.1" } ] }