pyLoad: Server-Side Request Forgery via Download Link Submission Enables Cloud Metadata Exfiltration
pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch.
References
-
https://github.com/pyload/pyload/security/advisories/GHSA-m74m-f7cr-432x x_refsource_CONFIRM
Affected products
- ==< 0.5.0b3.dev97
Matching in nixpkgs
pkgs.pyload-ng
Free and open-source download manager with support for 1-click-hosting sites
-
nixos-unstable 0.5.0b3.dev88
- nixpkgs-unstable 0.5.0b3.dev88
- nixos-unstable-small 0.5.0b3.dev88
-
nixos-25.11 0.5.0b3.dev88
- nixos-25.11-small 0.5.0b3.dev88
- nixpkgs-25.11-darwin 0.5.0b3.dev88
pkgs.python312Packages.pyloadapi
Simple wrapper for pyLoad's API
pkgs.python313Packages.pyloadapi
Simple wrapper for pyLoad's API
pkgs.python314Packages.pyloadapi
Simple wrapper for pyLoad's API
pkgs.home-assistant-component-tests.pyload
Open source home automation that puts local control and privacy first
pkgs.tests.home-assistant-component-tests.pyload
Open source home automation that puts local control and privacy first
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>
-
@ruby0b ruby0b