pyLoad has Path Traversal Vulnerability in json/upload Endpoint that allows Arbitrary File Write
链接: https://github.com/advisories/GHSA-xqpg-92fq-grfg
仓库 Star: 3540
CVSS 评分: 7.5
参考链接:
https://github.com/pyload/pyload/security/advisories/GHSA-xqpg-92fq-grfg
https://github.com/pyload/pyload/commit/fc4b136e9c4e7dcbb8e467ae802cb2c3f70a71b0
描述:
Summary
An authenticated path traversal vulnerability exists in the /json/upload
endpoint of the pyLoad
By manipulating the filename of an uploaded file, an attacker can traverse out of the intended upload directory, allowing them to write arbitrary files to any location on the system accessible to the pyLoad process. This may lead to:
- Remote Code Execution (RCE)
- Local Privilege Escalation
- System-wide compromise
- Persistence and backdoors
Vulnerable Code
File: src/pyload/webui/app/blueprints/json_blueprint.py
1 |
|
Issue: No sanitization or validation on file.filename
, allowing traversal via ../../
sequences.
(Proof of Concept)
- Clone and install pyLoad from source (
pip install pyload-ng
):
1 |
|
- Or install via pip (PyPi) in virtualenv:
1 |
|
- Login and obtain session token
1 |
|
- Create malicious cron payload
1 |
|
- Upload file with path traversal filename
1 |
|
- On the next cron tick, a reverse shell or payload will be triggered.
BurpSuite HTTP Request
1 |
|
pyLoad has Path Traversal Vulnerability in json/upload Endpoint that allows Arbitrary File Write
http://example.com/2025/07/21/github_3957047836/