{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1240","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","state":"PUBLISHED","assignerShortName":"@huntr_ai","dateReserved":"2024-02-05T22:31:20.037Z","datePublished":"2024-11-15T10:57:07.797Z","dateUpdated":"2024-11-15T19:07:26.471Z"},"containers":{"cna":{"title":"Open Redirection in pyload/pyload","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntr_ai","dateUpdated":"2024-11-15T10:57:07.797Z"},"descriptions":[{"lang":"en","value":"An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79."}],"affected":[{"vendor":"pyload","product":"pyload/pyload","versions":[{"version":"unspecified","lessThan":"pyload-ng 0.5.0b3.dev79","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e"},{"url":"https://github.com/pyload/pyload/commit/fe94451dcc2be90b3889e2fd9d07b483c8a6dccd"}],"metrics":[{"cvssV3_0":{"version":"3.0","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","baseScore":4.6,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-601 URL Redirection to Untrusted Site","cweId":"CWE-601"}]}],"source":{"advisory":"eef9513d-ccc3-4030-b574-374c5e7b887e","discovery":"EXTERNAL"}},"adp":[{"affected":[{"vendor":"payload","product":"payload","cpes":["cpe:2.3:a:payload:payload:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"pyload-ng 0.5.0b3.dev79","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.6,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T19:04:11.868290Z","id":"CVE-2024-1240","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T19:07:26.471Z"}}]}}