CVE-2025-54802 (CNNVD-202508-289)
中文标题:
pyLoad 安全漏洞
英文标题:
pyLoad CNL Blueprint is vulnerable to Path Traversal through `dlc_path` leading to Remote Code Execution (RCE)
漏洞描述
中文描述:
pyLoad是pyLoad开源的一个用 Python 编写的免费开源下载管理器。 pyLoad 0.5.0b3.dev89及之前版本存在安全漏洞,该漏洞源于路径遍历漏洞,可能导致任意文件写入和远程代码执行。
英文描述:
pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing unauthenticated attackers to write arbitrary files outside the designated storage directory. This can be abused to overwrite critical system files, including cron jobs and systemd services, leading to privilege escalation and remote code execution as root. This issue is fixed in version 0.5.0b3.dev90.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| pyload | pyload | >= 0.5.0b3.dev89, < 0.5.0b3.dev90 | - | - |
cpe:2.3:a:pyload:pyload:>=_0.5.0b3.dev89,_<_0.5.0b3.dev90:*:*:*:*:*:*:*
|
| pyload-ng_project | pyload-ng | 0.5.0b3.dev89 | - | - |
cpe:2.3:a:pyload-ng_project:pyload-ng:0.5.0b3.dev89:*:*:*:*:python:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-54802 |
2025-11-11 15:23:29 | 2025-11-11 07:40:42 |
| NVD | nvd_CVE-2025-54802 |
2025-11-11 15:00:58 | 2025-11-11 07:48:30 |
| CNNVD | cnnvd_CNNVD-202508-289 |
2025-11-11 15:12:52 | 2025-11-11 08:00:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202508-289
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']