Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16328

Опубликовано: 03 окт. 2019
Источник: debian

Описание

In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rpycnot-affectedpackage

Примечания

  • Issue only affected 4.1.0 and 4.1.1 upstream and fixed in 4.1.2

  • https://rpyc.readthedocs.io/en/latest/docs/security.html#security

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

CVSS3: 7.5
nvd
больше 6 лет назад

In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

suse-cvrf
больше 5 лет назад

Security update for python-rpyc

CVSS3: 8.5
github
почти 5 лет назад

Dynamic modification of RPyC service due to missing security check