pyLoad vulnerable to XSS through insecure CAPTCHA
链接: https://github.com/advisories/GHSA-8w3f-4r8f-pf53
仓库 Star: 3536
CVSS 评分: 9.8
参考链接:
https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53
https://github.com/pyload/pyload/commit/909e5c97885237530d1264cfceb5555870eb9546
描述:
Summary
An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system rce.
Details
The vulnerable code resides in
1 |
|
- The
onCaptchaResult()
function directly passes CAPTCHA results (sent from the user) intoeval()
- No sanitization or validation is performed on this input
- A malicious CAPTCHA result can include JavaScript such as
fetch()
orchild_process.exec()
in environments using NodeJS - Attackers can fully hijack sessions and pivot to remote code execution on the server if the environment allows it
Reproduction Methods
- Official Source Installation:
1 |
|
- Virtual Environment:
1 |
|
CAPTCHA Endpoint Verification
Technical Clarification:
The vulnerable endpoint is actually:
1
/interactive/captcha
Complete PoC Request:
1 |
|
- Curl Command Correction:
1 |
|
- Vulnerable Code Location:
The eval() vulnerability is confirmed in:1
src/pyload/webui/app/static/js/captcha-interactive.user.js
Resources
pyLoad vulnerable to XSS through insecure CAPTCHA
http://example.com/2025/07/15/github_2107497278/