Miggo Logo

GHSA-x698-5hjm-w2m5: pyLoad is vulnerable to attacks that bypass localhost restrictions, enabling the creation of arbitrary packages

7.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
7/8/2025
Updated
7/8/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pyload-ngpip<= 0.5.0b3.dev88

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability exists in the local_check decorator, which improperly uses the user-controllable HTTP_HOST header to verify if a request originates from localhost. An attacker can spoof this header to bypass the access control. The patch removes the check for the HTTP_HOST header, leaving only the check for REMOTE_ADDR, which is a more reliable way to determine the origin of a request. The add function is an example of a function that is protected by this vulnerable decorator, and would appear in a runtime profile during exploitation of this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *ny un*ut**nti**t** *tt**k*r **n *yp*ss t** lo**l*ost r*stri*tions pos** *y t** *ppli**tion *n* utiliz* t*is to *r**t* *r*itr*ry p**k***s. ### **t*ils *ny un*ut**nti**t** *tt**k*r **n *yp*ss t** lo**l*ost r*stri*tions pos** *y t** *ppli*

Reasoning

T** vuln*r**ility *xists in t** `lo**l_****k` ***or*tor, w*i** improp*rly us*s t** us*r-*ontroll**l* `*TTP_*OST` *****r to v*ri*y i* * r*qu*st ori*in*t*s *rom lo**l*ost. *n *tt**k*r **n spoo* t*is *****r to *yp*ss t** ****ss *ontrol. T** p*t** r*mov*