CVE-2024-39205: pyload-ng vulnerable to RCE with js2py sandbox escape
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9816%
CWE
Published
9/9/2024
Updated
10/28/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pyload-ng | pip | <= 0.5.0b3.dev85 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the /flash/addcrypted2
endpoint's use of js2py
to evaluate JavaScript from the 'jk' parameter. Despite js2py
's intended sandboxing (via disable_pyimport()
), the CVE-2024-28397 sandbox escape allows accessing Python's subprocess.Popen
through prototype pollution. The endpoint's insufficient network access controls (relying on Host header validation) and direct exposure of js2py
execution to user input make this function the attack surface. The PoC demonstrates direct exploitation through this endpoint, confirming its role in the vulnerability chain.