<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pyload-Ng (&lt;= 0.5.0b3.dev99) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/pyload-ng--0.5.0b3.dev99/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/pyload-ng--0.5.0b3.dev99/feed.xml" rel="self" type="application/rss+xml"/><item><title>PyLoad Path Traversal Vulnerability in set_package_data</title><link>https://feed.craftedsignal.io/briefs/2026-05-pyload-path-traversal/</link><pubDate>Wed, 06 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pyload-path-traversal/</guid><description>PyLoad versions 0.5.0b3.dev99 and earlier are vulnerable to a path traversal vulnerability in the `set_package_data` function, allowing attackers to write files to arbitrary directories with the privileges of the PyLoad process.</description><content:encoded><![CDATA[<p>PyLoad, a free and open-source download manager, is vulnerable to a path traversal vulnerability within its <code>set_package_data</code> API function. Specifically, versions up to and including 0.5.0b3.dev99 fail to properly sanitize the package folder name. This lack of sanitization allows a user with <code>Perms.MODIFY</code> to specify arbitrary directories as download locations for a package. An attacker can leverage this flaw to write files outside the intended download directory, potentially leading to arbitrary code execution if the PyLoad process has sufficient privileges. The vulnerability was disclosed in GHSA-838g-gr43-qqg9 on May 5, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the PyLoad API, potentially through leaked credentials or other vulnerabilities.</li>
<li>The attacker crafts a POST request to the <code>/api/add_package</code> endpoint to create a new package with a specified name and download link (e.g., <code>http://example.com/file.txt</code>). The response includes the assigned package ID.</li>
<li>The attacker crafts a POST request to the <code>/api/set_package_data</code> endpoint, targeting the newly created package ID.</li>
<li>Within the JSON payload for <code>set_package_data</code>, the attacker includes a <code>data</code> object with the key <code>_folder</code> set to an absolute path containing directory traversal sequences (e.g., <code>/users/root/</code>).</li>
<li>The PyLoad application, lacking proper sanitization, accepts the attacker-controlled path as the download location.</li>
<li>The attacker triggers a download associated with the package.</li>
<li>PyLoad attempts to write downloaded files to the attacker-specified path (e.g., <code>/users/root/</code>), potentially overwriting existing files or creating new ones.</li>
<li>The attacker achieves arbitrary file write, leading to potential privilege escalation or code execution if writable locations like system configuration files are targeted.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to write files to arbitrary locations on the file system with the privileges of the PyLoad process. This could lead to privilege escalation, arbitrary code execution, or denial of service. Given that PyLoad is often deployed on personal servers or NAS devices, the impact could range from data theft to complete system compromise. Affected versions include all PyLoad versions up to and including 0.5.0b3.dev99.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PyLoad to a version beyond 0.5.0b3.dev99 that includes the patch for CVE-2026-42315.</li>
<li>Deploy the Sigma rule <code>Detect PyLoad set_package_data Path Traversal</code> to detect attempts to exploit this vulnerability by monitoring for suspicious folder paths in <code>set_package_data</code> requests.</li>
<li>Monitor web server logs for POST requests to <code>/api/set_package_data</code> with suspicious <code>_folder</code> values containing absolute paths and directory traversal sequences.</li>
<li>Review and restrict API access to PyLoad to only trusted sources to mitigate the risk of unauthorized exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>pyload</category></item></channel></rss>