logo

GHSA-9ggp-4jpr-7ppj rpyc

Package

Manager: pip
Name: rpyc
Vulnerable Version: <0

Severity

Level: High

CVSS v3.1: N/A

CVSS v4.0: N/A

EPSS: N/A pctlN/A

Details

Duplicate Advisory: Possible remote code execution via a remote procedure call Withdrawn: duplicate of GHSA-pj4g-4488-wmxm ## Original Description In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

Metadata

Created: 2019-11-20T01:35:53Z
Modified: 2024-10-26T22:38:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-9ggp-4jpr-7ppj/GHSA-9ggp-4jpr-7ppj.json
CWE IDs: []
Alternative ID: N/A
Finding: N/A
Auto approve: 0