GHSA-9ggp-4jpr-7ppj – rpyc
Package
Manager: pip
Name: rpyc
Vulnerable Version: <0
Severity
Level: High
CVSS v3.1: N/A
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Possible remote code execution via a remote procedure call Withdrawn: duplicate of GHSA-pj4g-4488-wmxm ## Original Description In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
Metadata
Created: 2019-11-20T01:35:53Z
Modified: 2024-10-26T22:38:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-9ggp-4jpr-7ppj/GHSA-9ggp-4jpr-7ppj.json
CWE IDs: []
Alternative ID: N/A
Finding: N/A
Auto approve: 0